<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Core Infrastructure and Security Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/bg-p/CoreInfrastructureandSecurityBlog</link>
    <description>Core Infrastructure and Security Blog articles</description>
    <pubDate>Thu, 16 Apr 2026 00:44:44 GMT</pubDate>
    <dc:creator>CoreInfrastructureandSecurityBlog</dc:creator>
    <dc:date>2026-04-16T00:44:44Z</dc:date>
    <item>
      <title>Microsoft Defender for Endpoint (MDE) — Custom Role Design for Troubleshooting Mode–Only Access</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/microsoft-defender-for-endpoint-mde-custom-role-design-for/ba-p/4510646</link>
      <description>&lt;P&gt;&lt;STRONG&gt;1) Introduction&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In customer environments, &lt;STRONG&gt;Security Operations (SOC)&lt;/STRONG&gt; teams and &lt;STRONG&gt;Windows infrastructure&lt;/STRONG&gt; teams frequently need to investigate endpoint issues in the Microsoft Defender for Endpoint portal—often under time pressure—while still preserving strong governance over who can change security controls.&lt;/P&gt;
&lt;P&gt;Because &lt;STRONG&gt;Troubleshooting Mode&lt;/STRONG&gt; can enable temporary modification of Defender Antivirus settings even when devices are governed by organizational policies (for example, when policy protections are in place using Tamper protection settings), granting this capability broadly can introduce &lt;STRONG&gt;configuration drift&lt;/STRONG&gt;, increase operational risk, and blur accountability.&lt;/P&gt;
&lt;P&gt;To address this, customers typically require a &lt;STRONG&gt;least‑privilege, scoped access model&lt;/STRONG&gt; that enforces &lt;STRONG&gt;Segregation of Duties (SoD)&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Investigators (Security Reader)&lt;/STRONG&gt; retain visibility and investigation capability but &lt;STRONG&gt;cannot create or modify MDE security policies&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Only an explicitly authorized group&lt;/STRONG&gt; is granted the minimum permissions required to enable Troubleshooting Mode, and that access is &lt;STRONG&gt;restricted to a defined device scope&lt;/STRONG&gt; using device groups—supporting both risk reduction and clear governance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This approach ensures teams can perform required investigations and controlled troubleshooting while maintaining &lt;STRONG&gt;least privilege&lt;/STRONG&gt;, &lt;STRONG&gt;SoD&lt;/STRONG&gt;, and predictable operational impact across the customer’s environment.&lt;/P&gt;
&lt;P&gt;This document describes an approach to providing controlled access to Troubleshooting Mode on a scoped set of devices.&lt;/P&gt;
&lt;P&gt;- An Entra ID user group to collect eligible users&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- A custom Defender XDR role with only the minimum required permissions&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Microsoft Defender for Endpoint device groups to scope where those permissions apply&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The goal is to enable safe troubleshooting while&amp;nbsp;maintaining&amp;nbsp;least&amp;nbsp;privilege and preventing unintended policy changes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;2) Prerequisite &amp;amp; Coverage &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- An Entra ID user group to collect eligible users&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- A custom Defender XDR role with only the minimum required permissions&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Microsoft Defender for Endpoint device groups to scope where those permissions apply&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The goal is to enable safe troubleshooting while&amp;nbsp;maintaining&amp;nbsp;least&amp;nbsp;privilege and preventing unintended policy changes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This setup is necessary to: &amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Enforce least privilege (only the permissions needed for Troubleshooting Mode and limited operational actions)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Scope powerful actions to a defined device group instead of all devices&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Support a split model where one Security Reader group gets Troubleshooting Mode&amp;nbsp;access&amp;nbsp;and another Security Reader group&amp;nbsp;remains&amp;nbsp;view/operate&amp;nbsp;without TS Mode&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Preserve governance: users can investigate and perform limited actions but cannot create or modify MDE policies&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Improve auditability by ensuring key actions are observable via device telemetry and the Action Center (while acknowledging that some telemetry may not include the initiating username).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3) Implementation Steps for Troubleshooting Mode (TO BE PERFORMED IN MICROSOFT DEFENDER PORTAL / ENTRA ID)&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3.1 Prepare Entra ID User Group&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Identify an existing Entra ID user group that contains users (IT Infra Team) with the Security Reader role or create a new dedicated Entra ID user group for this purpose.&lt;/P&gt;
&lt;P&gt;- This group will be used consistently for:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Assigning the custom Defender XDR role&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Scoping access to Defender for Endpoint device groups&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;3.2 Create and Assign Custom Defender XDR Role&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Create a custom Defender XDR role with Microsoft Defender for Endpoint (MDE) Security Settings Management permissions.&lt;/P&gt;
&lt;P&gt;- While creating the custom role, select only the minimum required permissions to maintain a least-privilege model.&lt;/P&gt;
&lt;P&gt;- Assign this custom Defender XDR role to the Entra ID user group identified in Step 1.&lt;/P&gt;
&lt;P&gt;Reference: See screenshots below for role creation, permission selection, and Entra ID group assignment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3.3: Assign Entra ID User Group to Device Group&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assign the same Entra ID user group (used in Steps 1 and 2) to a Microsoft Defender for Endpoint device group.&lt;/P&gt;
&lt;P&gt;- Devices in the device group should be dynamically grouped using supported criteria such as:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Device tags&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Device name patterns&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Other supported device attributes&lt;/P&gt;
&lt;P&gt;- This scoping ensures that the custom role permissions apply only to the intended set of devices.&lt;/P&gt;
&lt;P&gt;Reference: See screenshot under below showing device group creation and Entra ID group-to-device group assignment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3.4 Resulting User Experience and Permissions&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After completing Steps 3.1 through 3.3, users who sign in with:&lt;/P&gt;
&lt;P&gt;- Security Reader role, and&lt;/P&gt;
&lt;P&gt;- Custom Defender XDR role&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;will observe the following behavior in the Microsoft Defender portal:&lt;/P&gt;
&lt;P&gt;- Troubleshooting Mode is available on the scoped devices&lt;/P&gt;
&lt;P&gt;- Users cannot create or modify MDE policies&lt;/P&gt;
&lt;P&gt;- Users have access only to a controlled set of operational and investigative actions, including:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Exclude&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Go hunt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Download force release from isolation script&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Ask Defender Experts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This configuration enables safe troubleshooting while preventing configuration drift or unauthorized security policy changes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reference: See screenshot under below illustrating the available actions and the absence of policy creation/modification options.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reference: See screenshot below where creation of AV policy failed as User will not have access to Intune to create policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4&lt;/STRONG&gt;. In an alternate scenario, two separate Security Reader groups are maintained: one group requires access to Troubleshooting Mode, while the other should have no Troubleshooting Mode access. Users in the latter group (no TS Mode requirement) can continue to use standard Microsoft Defender for Endpoint (MDE) operational capabilities such as managing tags, setting device criticality, running antivirus scans, collecting an investigation package, reporting device inaccuracy, initiating advanced hunting (Go hunt), triggering policy sync, and running automated investigations. Users in the Troubleshooting Mode-enabled Security Reader group must also be assigned to the appropriate MDE device group to ensure their device-level access and workflows continue to function as expected.&lt;/P&gt;
&lt;P&gt;Reference: See the screenshot below, which illustrates the additional MDE capabilities available to users who also have access to the device group&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5: Auditing and Event Visibility&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- Events related to Tamper Protection changes and Troubleshooting Mode enablement are captured in Microsoft Defender for Endpoint telemetry.&lt;/P&gt;
&lt;P&gt;- These events are logged and visible for audit and investigation purposes.&lt;/P&gt;
&lt;P&gt;- The username is not recorded in these specific event entries, which is expected behavior in the current Defender auditing model. However, the activation of Troubleshooting Mode is still logged and visible in the device Action Center, which allows confirmation that the mode was enabled on the device and the username.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reference: See screenshot under Step 6 showing the relevant audit and event records in Timeline of Device Page.&amp;nbsp; Similarly ,correlate using KQL across two Event Tables (DeviceEvents &amp;amp; EntraIdSignInEvents).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is the KQL query&lt;/P&gt;
&lt;P&gt;let TimeWindow = 10m;&lt;/P&gt;
&lt;P&gt;let Lookback&amp;nbsp; = 7d;&lt;/P&gt;
&lt;P&gt;// Portal sign-ins (Security &amp;amp; Compliance Center)&lt;/P&gt;
&lt;P&gt;let DefenderPortalSignins =&lt;/P&gt;
&lt;P&gt;materialize(&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EntraIdSignInEvents&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where Timestamp &amp;gt;= ago(Lookback)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where Application == "Microsoft 365 Security and Compliance Center"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SignInTime = Timestamp,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PortalUserUpn = AccountUpn,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PortalUserObjectId = AccountObjectId,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SignInIP = IPAddress,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CorrelationId&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | extend TimeBucket = bin(SignInTime, TimeWindow)&lt;/P&gt;
&lt;P&gt;);&lt;/P&gt;
&lt;P&gt;// Tamper-protection related events (broaden as needed)&lt;/P&gt;
&lt;P&gt;let TamperEvents =&lt;/P&gt;
&lt;P&gt;materialize(&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DeviceEvents&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where Timestamp &amp;gt;= ago(Lookback)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | where ActionType has "Tamper" or ActionType == "TamperingAttempt"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | project&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TamperTime = Timestamp,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DeviceId,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DeviceName,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ActionType,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AdditionalFields&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | extend TimeBucket = bin(TamperTime, TimeWindow)&lt;/P&gt;
&lt;P&gt;);&lt;/P&gt;
&lt;P&gt;// Output rows: (UPN, TamperTime) within +/- window&lt;/P&gt;
&lt;P&gt;TamperEvents&lt;/P&gt;
&lt;P&gt;| join kind=inner (DefenderPortalSignins) on TimeBucket&lt;/P&gt;
&lt;P&gt;| where abs(datetime_diff("minute", TamperTime, SignInTime)) &amp;lt;= toint(TimeWindow / 1m)&lt;/P&gt;
&lt;P&gt;| project&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PortalUserUpn,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; TamperTime,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; SignInTime,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DeviceName,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DeviceId,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ActionType,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; SignInIP,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; CorrelationId,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; AdditionalFields&lt;/P&gt;
&lt;P&gt;| order by TamperTime desc&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;This query correlates by time proximity. It indicates “user signed into the portal around the time a tamper event happened.”&lt;/LI&gt;
&lt;LI&gt;It does not prove that the portal user caused the tamper event (that requires audit telemetry for the action). If you later want attribution (“who enabled troubleshooting mode / changed settings”), we should pivot to Defender Action Center message and then confirm the user.&lt;/LI&gt;
&lt;LI&gt;The query can be used for generating alert using custom detection rule and take this alert to Security Operations center using API integration.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Below is reference to the sample output of the query.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;6) Summary&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Option 3 enables a controlled Troubleshooting Mode experience by combining Entra ID group-based user assignment, a custom Defender XDR role with minimal permissions, and device group scoping in MDE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this approach, eligible users can troubleshoot only the intended devices and perform a limited, operationally safe set of actions, while policy creation/modification&amp;nbsp;remains&amp;nbsp;restricted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Audit and investigation are supported through MDE telemetry and device Action Center visibility, with the known limitation that certain telemetry entries may not include the initiating username.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 05:43:59 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/microsoft-defender-for-endpoint-mde-custom-role-design-for/ba-p/4510646</guid>
      <dc:creator>SantoshPargi</dc:creator>
      <dc:date>2026-04-13T05:43:59Z</dc:date>
    </item>
    <item>
      <title>Customer Offerings: Azure Local - Implementation, Migration, and Management</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/customer-offerings-azure-local-implementation-migration-and/ba-p/4510593</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi everyone!&lt;/P&gt;
&lt;P&gt;Brandon here, back once again to talk to you about a couple of new offerings that have just been released to assist our Unified customers with their on-premises virtualization needs! I continue to have the privilege of leading a great program and team helping customers to migrate from VMware to more cost-effective and/or modern solutions. These new offerings are &amp;lt;drum roll&amp;gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/customer-offerings-hyper-v---implementation-migration-and-management/4510592" target="_blank"&gt;Hyper-V - Implementation, Migration, and Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure Local - Implementation, Migration, and Management&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;NOTE: These offerings do not provide hands on keyboard support, do not create custom documentation for customers, and cannot provide direct support for any 3&lt;SUP&gt;rd&lt;/SUP&gt; party products that may be used in the process of migrations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many customers are reassessing their virtualization strategies and are actively exploring alternatives to VMware that align with long‑term hybrid cloud goals. Azure Local offers a purpose‑built platform that combines proven Windows Server–based virtualization with Azure services and management tooling, enabling customers to modernize on‑premises infrastructure while maintaining tight integration with Azure management, security, and governance capabilities.&lt;/P&gt;
&lt;P&gt;Whether driven by changing licensing models, cost optimization, or the need for deeper hybrid cloud integration, a successful transition requires more than a technology shift—it requires a structured, outcome‑focused approach. While we are providing these new offerings to customers, you do also have the option of more extended engagements as well that are broader in scope and more tailored to the end goals while we work side by side with you.&lt;/P&gt;
&lt;P&gt;If you are a Unified customer and looking to move off of VMware to Azure Local, or you just need help with your on-premises Microsoft virtualization technologies in general, have your account manager (CSAM) reach out to me!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Planning to go at it alone??&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Virtually (no pun intended) every environment reviewed by my team (and that is a LOT) that was set up prior to our review will have configuration issues, at times warranting extensive efforts to correct.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Problem 1&lt;/U&gt;:&lt;/EM&gt;&lt;/STRONG&gt; There are some potentially significant differences between the way VMware and Azure Local are architected from the start, especially in areas of networking and storage, where mimicking methods used in the VMware world can actually lead to performance degradation in your target Azure Local environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Problem 2&lt;/U&gt;:&lt;/EM&gt;&lt;/STRONG&gt; Your management method must also change. Additionally, if you are converting/migrating to Azure Local, the available methods need to be determined, the terminology and functional differences identified and learned…there can be a lot to unpack in this area.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Problem 3&lt;/U&gt;:&lt;/EM&gt;&lt;/STRONG&gt; Perhaps the most obvious is that this may be a new platform for your team, and its important for them to gain experience through guided actions and knowledge transfer on the fly for those questions they really have, which is exactly what we aim to provide in guiding implementations and migrations!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A Structured Engagement Model&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Successful Azure Local implementations are built around a guided engagement model rather than a one‑size‑fits‑all checklist. Each engagement is tailored to the customer environment, acknowledging that differences in scale, workloads, hardware, and operational maturity directly influence the migration approach. The framework emphasizes collaboration, clarity of expectations, and incremental progress instead of disruptive “lift‑and‑shift” execution. Whether we are talking about migration from another virtualization platform, or simply trying to reduce costs by implementing a new virtualization infrastructure, we’re here to help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Phases of an Azure Local Implementation and/or Migration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Most Azure Local implementation and migration engagements progress through a common set of phases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Engagement scoping and technical discovery&lt;/STRONG&gt; to understand goals and current state (this is the conversation I, or one of the TZ Leads in the VMware Migration Program have with customers)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Planning and design&lt;/STRONG&gt; aligned to business and operational outcomes, with a limited scope&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deployment and configuration validation&lt;/STRONG&gt; to ensure platform readiness&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security and migration testing&lt;/STRONG&gt; to reduce risk and confirm workload compatibility&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Feature enablement&lt;/STRONG&gt;, including Azure Arc, to extend governance and management&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;While these phases provide structure, the sequence and depth of each stage are adapted based on the customer environment and objectives.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Outcomes for Customers&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Organizations that engage in Azure Local implementation or migration efforts commonly achieve:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Deeper familiarity with Microsoft virtualization technologies&lt;/LI&gt;
&lt;LI&gt;Successful deployment of PoC, pilot, or production environments&lt;/LI&gt;
&lt;LI&gt;Validated test migrations of virtual machines&lt;/LI&gt;
&lt;LI&gt;Identification and resolution of technical blockers&lt;/LI&gt;
&lt;LI&gt;Increased confidence in operational readiness&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These engagements are advisory and collaborative in nature, prioritizing customer enablement and success.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Knowledge Transfer and Operational Readiness&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A central focus of the Azure Local engagements is ensuring that IT teams are prepared to operate the platform long after deployment completes. Knowledge transfer is embedded throughout the engagement through working sessions and direct participation in implementation activities. This approach helps organizations move confidently into steady‑state operations without relying on long‑term external support. As I mentioned above, if you do feel you will need longer term support, we have your back on that front as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Looking Beyond Migration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;An Azure Local migration is often the first step in a broader transformation journey. Many organizations use this transition to enable hybrid management, strengthen security posture, and prepare for future application or cloud modernization initiatives. When approached strategically, Azure Local becomes a platform for long‑term innovation and a step to modernizing your infrastructure, not just a replacement hypervisor.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Moving from VMware to Azure Local is not simply a technical migration—it is an opportunity to modernize how infrastructure is managed and governed. With structured planning, guided execution, and a focus on operational readiness, organizations can transition with confidence to a virtualization platform built for today’s hybrid cloud realities and tomorrow’s growth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reading, and maybe we’ll talk soon!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Apr 2026 19:55:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/customer-offerings-azure-local-implementation-migration-and/ba-p/4510593</guid>
      <dc:creator>BrandonWilson</dc:creator>
      <dc:date>2026-04-12T19:55:01Z</dc:date>
    </item>
    <item>
      <title>Customer Offerings: Hyper-V - Implementation, Migration, and Management</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/customer-offerings-hyper-v-implementation-migration-and/ba-p/4510592</link>
      <description>&lt;P&gt;Happy April everyone!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Brandon here, back once again to talk to you about a couple of new offerings that have just been released to assist our Unified customers with their on-premises virtualization needs! I continue to have the privilege of leading a great program and team helping customers to migrate from VMware to more cost-effective and/or modern solutions. These new offerings are &amp;lt;drum roll&amp;gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hyper-V - Implementation, Migration, and Management&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/customer-offerings-azure-local---implementation-migration-and-management/4510593" target="_blank" rel="noopener" data-lia-auto-title="Azure Local - Implementation, Migration, and Management" data-lia-auto-title-active="0"&gt;Azure Local - Implementation, Migration, and Management&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;NOTE: These offerings do not provide hands on keyboard support, do not create custom documentation for customers, and cannot provide direct support for any 3&lt;SUP&gt;rd&lt;/SUP&gt; party products that may be used in the process of migrations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many customers are taking a closer look at Microsoft Hyper‑V as a strategic alternative to traditional virtualization platforms. Whether driven by changing licensing models, cost optimization, or the need for deeper hybrid cloud integration, a successful transition requires more than a technology shift—it requires a structured, outcome‑focused approach. While we are providing these new offerings to customers, you do also have the option of more extended engagements as well that are broader in scope and more tailored to the end goals while we work side by side with you.&lt;/P&gt;
&lt;P&gt;If you are a Unified customer and looking to move off of VMware to Hyper-V, or you just need help with your on-premises Microsoft virtualization technologies in general, have your account manager (CSAM) reach out to me!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Planning to go at it alone??&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I’m starting here for a very good reason… Virtually (no pun intended) every environment reviewed by my team (and that is a LOT) that was set up for a VMware migration, will have configuration issues, many times warranting a complete redesign and re-deployment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Problem 1&lt;/U&gt;:&lt;/EM&gt;&lt;/STRONG&gt; There are some potentially significant differences between the way VMware and Hyper-V are architected from the start, especially in areas of networking and storage, where mimicking methods used in the VMware world can actually lead to performance degradation in your target Hyper-V environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Problem 2&lt;/U&gt;:&lt;/EM&gt;&lt;/STRONG&gt; To achieve feature parity, or near feature parity, your management method must also change. Additionally, if you are converting/migrating to Hyper-V, the available methods need to be determined, the terminology and functional differences identified and learned, well, honestly, I could go on for awhile on this, but I’ll spare you until we talk…&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Problem 3&lt;/U&gt;:&lt;/EM&gt;&lt;/STRONG&gt; Perhaps the most obvious is that this may be a new platform for your team, and its important for them to gain experience through guided actions and knowledge transfer on the fly for those questions they really have, which is exactly what we aim to provide in guiding implementations and migrations!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You mentioned management and conversion tools, what do you mean??&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Hyper‑V has several methods for management, which can vary based on the feature needs and environment size. As a simple example, if I have 1500 virtualization hosts and 30,000 virtual machines spread out globally, its probably not going to be as efficient to manage everything only through locally available consoles. The capabilities of these management methods are continuing to grow and improve based on customer feedback, along with feedback from the field team. Let’s take a quick look at these options:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Native Windows tools: Hyper-V management console, Failover Clustering management console, Server Manager, etc
&lt;UL&gt;
&lt;LI&gt;This management method is typically used for small labs or smaller production environments (for migrations/conversions these methods do not provide feature parity with VMware).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;System Center Virtual Machine Manager (SCVMM)
&lt;UL&gt;
&lt;LI&gt;This management method is fully supported for environments of all sizes. For migrations/conversions this method provides feature parity with VMware for management and features, along with offering VMware migration/conversion capability (offline). If you are already using any product from the System Center suite (SCCM, SCOM, SCORCH, SCSM, or DPM) then this can prove to be a great no cost option for you!&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Windows Admin Center: Administration Mode (aMode)
&lt;UL&gt;
&lt;LI&gt;This management method is fully supported for environments of all sizes, however, is not designed as an infrastructure wide virtualization management method, but for server management and administration. If your environment isn’t extremely large, and VMware feature parity is not a necessity, this can provide a great no cost option for management of your physical and virtual servers. In addition, this method provides an online conversion option (currently public preview), allowing for a more seamless migration from VMware.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Windows Admin Center: Virtualization Mode (vMode) (currently public preview)
&lt;UL&gt;
&lt;LI&gt;This management method is fully supported for environments of all sizes, and is designed solely for the purpose of managing the Hyper-V virtualization infrastructure, tying together the primary needs for virtualization fabric into an easy to navigate web-based UI.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Azure
&lt;UL&gt;
&lt;LI&gt;You can Arc enable any Windows host or virtual machine and have a method of management and integration with cloud based services. In addition, these can work in conjunction with all of the above options to improve your management experience for your platform, and allows for the easy implementation and integration of many cloud based technologies (such as Hyper-V replica backups to ASR)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOTE: You can learn more about Windows Admin Center evolution here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/windows-admin-center-architectural-changes/4488583" target="_blank" rel="noopener"&gt;Windows Admin Center Architectural Changes | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A Structured Engagement Model&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Successful Hyper‑V implementations are built around a guided engagement model rather than a one‑size‑fits‑all checklist. Each engagement is tailored to the customer environment, acknowledging that differences in scale, workloads, hardware, and operational maturity directly influence the migration approach. The framework emphasizes collaboration, clarity of expectations, and incremental progress instead of disruptive “lift‑and‑shift” execution. Whether we are talking about a migration from another virtualization platform, or simply trying to reduce costs by implementing a new virtualization infrastructure, we’re here to help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Phases of a Hyper‑V Implementation and/or Migration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Most Hyper‑V engagements progress through a common set of phases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Engagement scoping and technical discovery&lt;/STRONG&gt; to understand goals and current state (this is the conversation I, or one of the TZ Leads in the VMware Migration Program have with customers)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Planning and design&lt;/STRONG&gt; aligned to business and operational outcomes, with a limited scope&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deployment and configuration validation&lt;/STRONG&gt; to ensure platform readiness&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security and migration testing&lt;/STRONG&gt; to reduce risk and confirm workload compatibility&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional feature enablement&lt;/STRONG&gt;, including Azure Arc, to extend governance and management&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;While these phases provide structure, the sequence and depth of each stage are adapted based on the customer environment and objectives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Outcomes for Customers&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Organizations that engage in Hyper-V implementation or migration efforts commonly achieve:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Deeper familiarity with Microsoft virtualization technologies&lt;/LI&gt;
&lt;LI&gt;Successful deployment of PoC, pilot, or production environments&lt;/LI&gt;
&lt;LI&gt;Validated test migrations of virtual machines&lt;/LI&gt;
&lt;LI&gt;Identification and resolution of technical blockers&lt;/LI&gt;
&lt;LI&gt;Increased confidence in operational readiness&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These engagements are advisory and collaborative in nature, prioritizing customer enablement and success.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Knowledge Transfer and Operational Readiness&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A central focus of a Hyper‑V engagement is ensuring that IT teams are prepared to operate the platform long after deployment completes. Knowledge transfer is embedded throughout the engagement through working sessions and direct participation in implementation activities. This approach helps organizations move confidently into steady‑state operations without relying on long‑term external support. As I mentioned above, if you do feel you will need longer term support, we have your back on that front as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Looking Beyond Migration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A Hyper‑V migration is often the first step in a broader transformation journey. Many organizations use this transition to enable hybrid management, strengthen security posture, and prepare for future application or cloud modernization initiatives. When approached strategically, Hyper‑V becomes a platform for long‑term innovation, not just a replacement hypervisor.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Moving from VMware to Hyper‑V is not simply a technical migration—it is an opportunity to modernize how infrastructure is managed and governed. With structured planning, guided execution, and a focus on operational readiness, organizations can transition with confidence to a virtualization platform built for today’s hybrid cloud realities and tomorrow’s growth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reading, and maybe we’ll talk soon!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 02:50:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/customer-offerings-hyper-v-implementation-migration-and/ba-p/4510592</guid>
      <dc:creator>BrandonWilson</dc:creator>
      <dc:date>2026-04-13T02:50:50Z</dc:date>
    </item>
    <item>
      <title>Auditing FIDO2 authentication for Windows Sign-in</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/auditing-fido2-authentication-for-windows-sign-in/ba-p/4509702</link>
      <description>&lt;P&gt;Hello everyone, my name is Liju and I am a Cloud Solutions Architect helping customers secure their cloud and hybrid identities. With this post, I would like to show how FIDO2 security key authentication for Windows sign‑in can be audited on client devices.&lt;/P&gt;
&lt;P&gt;Recently, a customer of mine asked how they could:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Audit each use of a FIDO2 security key on a Windows client device&lt;/LI&gt;
&lt;LI&gt;Track all PIN verification attempts on the security key, including both successful and unsuccessful attempts&lt;/LI&gt;
&lt;LI&gt;Determine which user successfully authenticated to a Windows device using a FIDO2 security key&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;While standard Windows logon events such as &lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4624" target="_blank" rel="noopener"&gt;4624&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4625" target="_blank" rel="noopener"&gt;4625&lt;/A&gt; report the user and logon type, they do not indicate whether a FIDO2 security key was used. We can find this information in the &lt;STRONG&gt;Microsoft&lt;/STRONG&gt;&lt;STRONG&gt;‑Windows&lt;/STRONG&gt;&lt;STRONG&gt;‑WebAuthN/Operational&lt;/STRONG&gt; event log, although interpreting these events requires additional decoding and correlation.&lt;/P&gt;
&lt;DIV class="mce-toc"&gt;
&lt;H2 class="lia-linked-item"&gt;&lt;a id="community--1-ToC" class="lia-anchor"&gt;&lt;/a&gt;Table of Contents&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-EntraID" target="_self" data-lia-auto-title="Entra ID" data-lia-auto-title-active="0"&gt;Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-FIDO2SecurityKeyauthenticationinWindows" target="_self" data-lia-auto-title="FIDO2 Security Key authentication in Windows" data-lia-auto-title-active="0"&gt;FIDO2 Security Key authentication in Windows&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-Authenticationflow" target="_self" data-lia-auto-title="Authentication flow (high-level)" data-lia-auto-title-active="0"&gt;Authentication flow (high-level)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-MappingthestepstoWebAuthNevents" target="_self" data-lia-auto-title="Mapping the steps to WebAuthN events" data-lia-auto-title-active="0"&gt;Mapping the steps to WebAuthN events&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-WebAuthNEvents" target="_self" data-lia-auto-title="WebAuthN Events" data-lia-auto-title-active="0"&gt;WebAuthN Events&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-Challengegeneration" target="_self" data-lia-auto-title="Challenge generation" data-lia-auto-title-active="0"&gt;Challenge generation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-Requestconstruction" target="_self" data-lia-auto-title="Request construction" data-lia-auto-title-active="0"&gt;Request construction&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-HowtoparsetheCBOR-encodedrequest" target="_self" data-lia-auto-title="How to parse the CBOR-encoded request" data-lia-auto-title-active="0"&gt;How to parse the CBOR-encoded request&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-TranslatingEntrakeyidentifiertoWebAuthNCredentialId" target="_self" data-lia-auto-title="Translating Entra key identifier to WebAuthN Credential Id" data-lia-auto-title-active="0"&gt;Translating Entra key identifier to WebAuthN Credential Id&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-Authenticatorprocessing" target="_self" data-lia-auto-title="Authenticator processing" data-lia-auto-title-active="0"&gt;Authenticator processing&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-AuthenticatorPINValidation" target="_self" data-lia-auto-title="Authenticator PIN Validation" data-lia-auto-title-active="0"&gt;Authenticator PIN Validation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-HowtoparsetheCBOR-encodedrequest-2" target="_self" data-lia-auto-title="How to parse the CBOR-encoded request" data-lia-auto-title-active="0"&gt;How to parse the CBOR-encoded request&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-AuthenticatorGetAssertionoperation" target="_self" data-lia-auto-title="Authenticator GetAssertion operation" data-lia-auto-title-active="0"&gt;Authenticator GetAssertion operation&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-Responseprocessing" target="_self" data-lia-auto-title="Response processing" data-lia-auto-title-active="0"&gt;Response processing&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link" href="#community--1-Tyingitalltogether" target="_self" data-lia-auto-title="Tying it all together" data-lia-auto-title-active="0"&gt;Tying it all together&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But first, let us see how Entra ID stores the information when a user registers a FIDO2 security ley as an authentication method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 id="mcetoc_1jlkjdlpu_1" class="lia-linked-item"&gt;&lt;a id="community--1-EntraID" class="lia-anchor"&gt;&lt;/a&gt;Entra ID&lt;/H1&gt;
&lt;P&gt;For each user that has registered a FIDO2 security key, the keys are represented as a &lt;A href="https://learn.microsoft.com/en-us/graph/api/resources/fido2authenticationmethod?view=graph-rest-1.0" target="_blank" rel="noopener"&gt;fido2AuthenticationMethod&lt;/A&gt; resource on the user object. The identifier for the key is stored with a Base64URL encoding.&lt;/P&gt;
&lt;P&gt;In the example below the value is &lt;SPAN class="lia-text-color-14"&gt;&lt;EM&gt;7ebzDmVTSreLsJkrjm1mNA2&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;When a FIDO2 key is registered, an audit event is generated in Entra ID. The &lt;STRONG&gt;KeyIdentifier&lt;/STRONG&gt; is stored using standard Base64 encoding.&lt;/P&gt;
&lt;P&gt;In the example below the value is &lt;SPAN class="lia-text-color-14"&gt;&lt;EM&gt;7ebzDmVTSreLsJkrjm1mNA==&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;If diagnostic logging is enabled for Entra ID and if the&amp;nbsp;&lt;STRONG&gt;AuditLogs&lt;/STRONG&gt; are sent to a Log Analytics Workspace, this information can be queried using KQL.&lt;/P&gt;
&lt;LI-CODE lang=""&gt;AuditLogs
| where Category == "UserManagement"
| where OperationName == "Add Passkey (device-bound)"
| extend UserUPN = tostring(TargetResources[0].userPrincipalName)
| extend FIDOkeyId = tostring(TargetResources[0].displayName)&lt;/LI-CODE&gt;&lt;img /&gt;
&lt;P class="lia-align-right"&gt;&lt;A class="lia-internal-link" href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H1 id="mcetoc_1jlkjdlpu_2" class="lia-linked-item"&gt;&lt;a id="community--1-FIDO2SecurityKeyauthenticationinWindows" class="lia-anchor"&gt;&lt;/a&gt;FIDO2 Security Key authentication in Windows&lt;/H1&gt;
&lt;P&gt;When a user signs in with a FIDO2 security key, Windows is trying to answer one question:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Can this authenticator (security key) prove possession of the private key associated with a registered credential for this user?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This proof is provided in the form of a &lt;STRONG&gt;WebAuthN assertion&lt;/STRONG&gt;, which is a cryptographic response generated by the authenticator.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="mcetoc_1jlkjdlpu_3" class="lia-linked-item"&gt;&lt;a id="community--1-Authenticationflow" class="lia-anchor"&gt;&lt;/a&gt;Authentication flow (high-level)&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Challenge generation&lt;BR /&gt;&lt;/STRONG&gt;During FIDO2 authentication for a Microsoft Entra user, a &lt;STRONG style="color: rgb(30, 30, 30);"&gt;challenge&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; is generated by the relying party (for example, login.microsoft.com) and provided to the client (Windows).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Request construction&lt;BR /&gt;&lt;/STRONG&gt;Windows initiates a &lt;STRONG style="color: rgb(30, 30, 30);"&gt;WebAuthN GetAssertion request&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, which is encoded using &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;CBOR&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; (Concise Binary Object Representation), a compact binary format used by the FIDO2 protocol.&lt;BR /&gt;&lt;/SPAN&gt;The request contains the &lt;STRONG style="color: rgb(30, 30, 30);"&gt;clientDataHash&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; which is a hashed JSON object containing the challenge sent by Entra (along with other parameters).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Authenticator processing&lt;BR /&gt;&lt;/STRONG&gt;The request is sent to the authenticator using &lt;STRONG style="color: rgb(30, 30, 30);"&gt;CTAP&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; (Client to Authenticator Protocol).&lt;BR /&gt;&lt;/SPAN&gt;The authenticator then locates a matching credential for the relying party, performs user verification if required (for example, PIN or biometric) and constructs the &lt;STRONG style="color: rgb(30, 30, 30);"&gt;authenticatorData&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;, which includes the hash of the relying party ID (&lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;rpIdHash&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;)&lt;BR /&gt;&lt;/SPAN&gt;The authenticator finally generates the assertion by signing (&lt;STRONG style="color: rgb(30, 30, 30);"&gt;authenticatorData&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; + &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;clientDataHash&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;) using the credential’s private key&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;Response processing&lt;BR /&gt;&lt;/STRONG&gt;The authenticator returns the assertion (encoded in CBOR) to Windows.&lt;BR /&gt;Windows then decodes the CBOR response, extracts the assertion components (credential ID, authenticatorData, signature), evaluates the result and completes the WebAuthN operation.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H2 id="mcetoc_1jlkjdlpu_4" class="lia-linked-item"&gt;&lt;a id="community--1-MappingthestepstoWebAuthNevents" class="lia-anchor"&gt;&lt;/a&gt;Mapping the steps to WebAuthN events&lt;/H2&gt;
&lt;P&gt;Before we take a look at the WebAuthN events on the Windows client, let us see how the logon process maps directly to the Event Log task categories.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Step&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Details&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Event entry&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Challenge generation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Windows initiates authentication using a FIDO2 credential&lt;/P&gt;
&lt;P&gt;A TransactionId is created that ties all related events together.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;WebAuthN Ctap GetAssertion started (Event ID 1003)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Request construction&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Windows builds the CTAP2 request to send to the key&lt;/P&gt;
&lt;P&gt;Encoded in the request are the rpId and clientDataHash.&lt;/P&gt;
&lt;P&gt;For Entra ID, the rpId is login.microsoft.com&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cbor encode GetAssertion request (Event ID 1103)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td rowspan="2"&gt;
&lt;P&gt;Authenticator processing&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Windows transitions from WebAuthN to the CTAP layer, and authenticator interaction begins&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Ctap GetAssertion started (Event ID 2100)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Windows exchanges CTAP commands with the key&lt;/P&gt;
&lt;P&gt;This includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PIN verification (authenticatorClientPIN / getPINToken)&lt;/LI&gt;
&lt;LI&gt;Authentication request (authenticatorGetAssertion)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Ctap Usb Send Receive (Event ID 2225)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td rowspan="3"&gt;
&lt;P&gt;Response processing&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Authenticator returns result to Windows&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Ctap GetAssertion completed (Event ID 2102 / 2103)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Windows interpret the authenticator’s response&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cbor decode GetAssertion response (Event ID 1104)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Windows completes WebAuthN operation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;WebAuthN Ctap GetAssertion completed&amp;nbsp;&amp;nbsp; (Event ID 1004 / 1005)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 18.9064%" /&gt;&lt;col style="width: 44.8591%" /&gt;&lt;col style="width: 36.2345%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H1 id="mcetoc_1jlkjdlpu_5" class="lia-linked-item"&gt;&lt;a id="community--1-WebAuthNEvents" class="lia-anchor"&gt;&lt;/a&gt;WebAuthN Events&lt;/H1&gt;
&lt;H2 id="mcetoc_1jlkjdlpu_6" class="lia-linked-item"&gt;&lt;a id="community--1-Challengegeneration" class="lia-anchor"&gt;&lt;/a&gt;Challenge generation&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;WebAuthN Ctap GetAssertion started&lt;/STRONG&gt; event (Event ID 1003) indicates that Windows has initiated a WebAuthN authentication operation and is beginning the process of requesting an assertion from an authenticator. This marks the start of the FIDO2 authentication flow but does not yet involve communication with the security key or indicate whether authentication will succeed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H2 id="mcetoc_1jlkjdlpu_7" class="lia-linked-item"&gt;&lt;a id="community--1-Requestconstruction" class="lia-anchor"&gt;&lt;/a&gt;Request construction&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;Cbor encode GetAssertion request&lt;/STRONG&gt; event (Event ID 1103) shows Windows encoding a &lt;EM&gt;targeted&lt;/EM&gt; WebAuthN GetAssertion request.&lt;/P&gt;
&lt;P&gt;When the Request begins with 0x02, it indicates that this is a &lt;STRONG&gt;authenticatorGetAssertion&lt;/STRONG&gt; CTAP command.&lt;/P&gt;
&lt;P&gt;Note that whether or not a credential ID is present in this event depends on the scenario. When &lt;STRONG&gt;AllowCredentialCount&lt;/STRONG&gt; is greater than zero, the request includes one or more &lt;EM&gt;&lt;U&gt;specific&lt;/U&gt;&lt;/EM&gt; credential IDs (making it a “targeted” WebAuthN GetAssertion request). When it is zero, the authenticator is performing a credential discovery.&lt;/P&gt;
&lt;P&gt;The description may be parsed to get the credential Id and will match the key identifier from Entra ID when Base64 encoded.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-2" border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.9074%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;The &lt;STRONG&gt;Cbor encode GetAssertion request &lt;/STRONG&gt;event (Event ID 1103) is generally the most useful event for auditing each authentication attempts of a FIDO2 security key on a Windows client device.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P class="lia-linked-item lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="mcetoc_1jlkjdlpu_8" class="lia-linked-item"&gt;&lt;a id="community--1-HowtoparsetheCBOR-encodedrequest" class="lia-anchor"&gt;&lt;/a&gt;How to parse the CBOR-encoded request&lt;/H3&gt;
&lt;P&gt;Let us take the Cbor Encode GetAssertion Request event (ID 1103) and parse the CBOR-encoded data in its description&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;TransactionId: &lt;/STRONG&gt;{3443b0f7-a6a2-4b1c-9026-aea3ab93f662}&lt;BR /&gt;&lt;STRONG&gt;RpId:&lt;/STRONG&gt; login.microsoft.com&lt;BR /&gt;&lt;STRONG&gt;ClientDataHashAlgId: &lt;/STRONG&gt;S256&lt;BR /&gt;&lt;STRONG&gt;ClientDataLength: &lt;/STRONG&gt;176&lt;BR /&gt;&lt;STRONG&gt;ClientDataHash: &lt;/STRONG&gt;0x0E3A6FC2C6941563481563AFADF439276A2280A9F59E85197478BB748E625DF3&lt;BR /&gt;&lt;STRONG&gt;AllowCredentialCount: &lt;/STRONG&gt;1&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Request:&lt;/STRONG&gt; 0x02A401736C6F67696E2E6D6963726F736F66742E636F6D0258200E3A6FC2C6941563481563AFADF439276A2280A9F59E85197478BB748E625DF30381A262696450EDE6F30E65534AB78BB0992B8E6D663464747970656A7075626C69632D6B657905A1627570F5&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The first byte gives us the CTAP command.
&lt;UL&gt;
&lt;LI&gt;In this case it is &lt;STRONG&gt;0x02&lt;/STRONG&gt; which means &lt;STRONG&gt;authenticatorGetAssertion&lt;/STRONG&gt; (&lt;A href="https://fidoalliance.org/specs/fido-v2.2-rd-20230321/fido-client-to-authenticator-protocol-v2.2-rd-20230321.html#authenticatorGetAssertion" target="_blank" rel="noopener"&gt;Client to Authenticator Protocol (CTAP)&lt;/A&gt;)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Everything after that first byte is the CBOR payload (&lt;STRONG&gt;A4&lt;/STRONG&gt;01736C6F67696E2E6D6963726F736F66742E636F6D0258200E3A6FC2C6941563481563AFADF439276A2280A9F59E85197478BB748E625DF30381A262696450EDE6F30E65534AB78BB0992B8E6D663464747970656A7075626C69632D6B657905A1627570F5).
&lt;UL&gt;
&lt;LI&gt;Note that The CBOR payload starts with &lt;STRONG&gt;A4&lt;/STRONG&gt;. This means that the CBOR body is a map with 4 entries or named fields.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;If you do not want to decode the bytes by hand, a simple way to inspect the payload is to paste it into an online CBOR decoder such as &lt;A href="https://cbor.nemo157.com/" target="_blank" rel="noopener"&gt;CBOR Playground&lt;/A&gt;. The site accepts hex input and can parse it into a readable CBOR structure.&lt;/LI&gt;
&lt;LI&gt;Paste the CBOR payload into the input area. Make sure the input mode is &lt;STRONG&gt;Hex&lt;/STRONG&gt;, then use &lt;STRONG&gt;Parse&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;For this example, the decoded result is:&lt;/LI&gt;
&lt;/OL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;{&lt;BR /&gt;&amp;nbsp; 1: "login.microsoft.com",&lt;BR /&gt;&amp;nbsp; 2: h'0E3A6FC2C6941563481563AFADF439276A2280A9F59E85197478BB748E625DF3',&lt;BR /&gt;&amp;nbsp; 3: [&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "id": h'EDE6F30E65534AB78BB0992B8E6D6634',&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "type": "public-key"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;&amp;nbsp; ],&lt;BR /&gt;&amp;nbsp; 5: {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "up": true&lt;BR /&gt;&amp;nbsp; }&lt;BR /&gt;}&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;OL start="6"&gt;
&lt;LI&gt;This output is still using the CTAP numeric field keys (1-5), so the next step is to translate those numbers into the field names used by the GetAssertion request based on the table at &lt;A href="https://fidoalliance.org/specs/fido-v2.2-rd-20230321/fido-client-to-authenticator-protocol-v2.2-rd-20230321.html#authenticatorGetAssertion" target="_blank" rel="noopener"&gt;Client to Authenticator Protocol (CTAP)&lt;/A&gt;:
&lt;UL&gt;
&lt;LI&gt;1 = rpId&lt;/LI&gt;
&lt;LI&gt;2 = clientDataHash&lt;/LI&gt;
&lt;LI&gt;3 = allowList&lt;/LI&gt;
&lt;LI&gt;5 = options&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;So in plain English, the payload says:&lt;/LI&gt;
&lt;/OL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;{&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;rpId&lt;/STRONG&gt;": "login.microsoft.com",&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;clientDataHash&lt;/STRONG&gt;": "0E3A6FC2C6941563481563AFADF439276A2280A9F59E85197478BB748E625DF3",&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;allowList&lt;/STRONG&gt;": [&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "&lt;STRONG&gt;id&lt;/STRONG&gt;": "EDE6F30E65534AB78BB0992B8E6D6634",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "&lt;STRONG&gt;type&lt;/STRONG&gt;": "public-key"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;&amp;nbsp; ],&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;options&lt;/STRONG&gt;": {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "&lt;STRONG&gt;up&lt;/STRONG&gt;": true&lt;BR /&gt;&amp;nbsp; }&lt;BR /&gt;}&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;OL start="8"&gt;
&lt;LI&gt;For a bit more detail about each field:
&lt;UL&gt;
&lt;LI&gt;Key 1 contains the relying party ID&lt;/LI&gt;
&lt;LI&gt;Key 2 contains the 32-byte clientDataHash&lt;/LI&gt;
&lt;LI&gt;Key 3 contains an allowList array with one credential descriptor&lt;/LI&gt;
&lt;LI&gt;Key 5 contains an options map&lt;/LI&gt;
&lt;LI&gt;Inside options, up: true means user presence was requested&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For details on how to decode the CBOR payload yourself see &lt;A href="https://www.rfc-editor.org/rfc/rfc8949.html" target="_blank" rel="noopener"&gt;RFC 8949: Concise Binary Object Representation (CBOR)&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="mcetoc_1jlkjdlpu_9" class="lia-linked-item"&gt;&lt;a id="community--1-TranslatingEntrakeyidentifiertoWebAuthNCredentialId" class="lia-anchor"&gt;&lt;/a&gt;Translating Entra key identifier to WebAuthN Credential Id&lt;/H3&gt;
&lt;P&gt;The &lt;STRONG&gt;key identifier&lt;/STRONG&gt; from Entra ID when Base64 decoded will match the &lt;STRONG&gt;CredentialId&lt;/STRONG&gt; in the event.&lt;/P&gt;
&lt;P&gt;A sample PowerShell function that does this is given below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;function Convert-Base64UrlToBytes {
    param(
        [Parameter(Mandatory=$true)]
        [string]$Base64Url
    )

    # Convert Base64url to normal Base64
    $b64 = $Base64Url.Replace('-', '+').Replace('_', '/')

    # Add padding if required
    switch ($b64.Length % 4) {
        2 { $b64 += "==" }
        3 { $b64 += "=" }
        0 { }  # already aligned
        1 { throw "Invalid Base64url string length" }
    }

    # Decode Base64 → byte array
    return [Convert]::FromBase64String($b64)
}

cls

# Conversion from Base64URL encoded identifier (user object)
$bytes = Convert-Base64UrlToBytes "7ebzDmVTSreLsJkrjm1mNA2"
($bytes | ForEach-Object { $_.ToString("X2") }) -join ""

# Conversion from Base64 encoded identifier (audit log)
$bytes = Convert-Base64UrlToBytes "7ebzDmVTSreLsJkrjm1mNA=="
($bytes | ForEach-Object { $_.ToString("X2") }) -join "" 
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H2 id="mcetoc_1jlkjdlpu_10" class="lia-linked-item"&gt;&lt;a id="community--1-Authenticatorprocessing" class="lia-anchor"&gt;&lt;/a&gt;Authenticator processing&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;Ctap GetAssertion started&lt;/STRONG&gt; event (Event ID 2100) shows Windows starting a CTAP GetAssertion operation against a specific FIDO2 key.&lt;/P&gt;
&lt;img /&gt;
&lt;H3 id="mcetoc_1jlkjdlpu_11" class="lia-linked-item"&gt;&lt;a id="community--1-AuthenticatorPINValidation" class="lia-anchor"&gt;&lt;/a&gt;Authenticator PIN Validation&lt;/H3&gt;
&lt;P&gt;All PIN attempts generate a &lt;STRONG&gt;Ctap Usb Send Receive&lt;/STRONG&gt; event (Event ID 2225) where the &amp;nbsp;&lt;STRONG&gt;Request&lt;/STRONG&gt; starts with &lt;STRONG&gt;0x&lt;SPAN class="lia-text-color-14"&gt;06&lt;/SPAN&gt;A401010205&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;06&lt;/STRONG&gt; means this is a &lt;STRONG&gt;PIN-related command&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;If the request starts with &lt;STRONG&gt;06A401010205&lt;/STRONG&gt; this denotes a &lt;STRONG&gt;getPinToken&lt;/STRONG&gt; flag, meaning a &lt;STRONG&gt;PIN verification attempt.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If the &lt;STRONG&gt;Response&lt;/STRONG&gt; starts &lt;STRONG&gt;0x00&lt;/STRONG&gt;, it indicates a Success.&lt;/P&gt;
&lt;P&gt;Other possible values for the response field are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;0x31 - Incorrect PIN&lt;/LI&gt;
&lt;LI&gt;0x33 - PIN Auth Invalid&lt;/LI&gt;
&lt;LI&gt;0x34 - PIN Required&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-2" border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.9074%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Therefore,&amp;nbsp;&lt;STRONG&gt;Ctap Usb Send Receive&lt;/STRONG&gt; events (Event ID 2225) where the &lt;STRONG&gt;Request&lt;/STRONG&gt; starts with &lt;STRONG&gt;0x06A401010205 &lt;/STRONG&gt;will report all security key PIN attempts, both successful and unsuccessful, on the client device.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="mcetoc_1jlkjdlpu_12" class="lia-linked-item"&gt;&lt;a id="community--1-HowtoparsetheCBOR-encodedrequest-2" class="lia-anchor"&gt;&lt;/a&gt;&lt;a id="community--1-HowtoparsetheCBOR-encodedrequest" class="lia-anchor"&gt;&lt;/a&gt;How to parse the CBOR-encoded request&lt;/H3&gt;
&lt;P&gt;Let us try and parse the CBOR-encoded data in the event’s description once again.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;TransactionId: &lt;/STRONG&gt;{3443b0f7-a6a2-4b1c-9026-aea3ab93f662}&lt;BR /&gt;&lt;STRONG&gt;Request Command: &lt;/STRONG&gt;0x90&lt;BR /&gt;&lt;STRONG&gt;Response Command: &lt;/STRONG&gt;0x90&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Request:&lt;/STRONG&gt; 0x06A40101020503A5010203381820012158206F67957900E6BBEC39838F015E3F5D6918F5A8D76E401828363E51F6C256541222582027E8B11854CE667B8EE19DF3A3DEE4A3F0DB43809811C3A93F2E9C0293E466AA0650746BE172CD2402CFFCC94734BC98D16A&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Response: &lt;/STRONG&gt;0x00A1025093B2EE5307CC81EA08684FEBE22D536D&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The first byte in the request (&lt;STRONG&gt;0x06&lt;/STRONG&gt;) gives us the &lt;STRONG&gt;authenticatorClientPIN &lt;/STRONG&gt;CTAP command (&lt;A href="https://fidoalliance.org/specs/fido-v2.2-rd-20230321/fido-client-to-authenticator-protocol-v2.2-rd-20230321.html#authenticatorClientPIN" target="_blank" rel="noopener"&gt;Client to Authenticator Protocol (CTAP)&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;Everything after that first byte is the CBOR payload (&lt;STRONG&gt;A4&lt;/STRONG&gt;0101020503A5010203381820012158206F67957900E6BBEC39838F015E3F5D6918F5A8D76E401828363E51F6C256541222582027E8B11854CE667B8EE19DF3A3DEE4A3F0DB43809811C3A93F2E9C0293E466AA0650746BE172CD2402CFFCC94734BC98D16A).
&lt;UL&gt;
&lt;LI&gt;As before &lt;STRONG&gt;A4&lt;/STRONG&gt; means that the CBOR body is a map with &lt;STRONG&gt;4&lt;/STRONG&gt; entries or named fields.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Parsing this payload using &lt;A href="https://cbor.nemo157.com/" target="_blank" rel="noopener"&gt;CBOR Playground&lt;/A&gt; we get:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;{&lt;BR /&gt;&amp;nbsp; 1: 1,&lt;BR /&gt;&amp;nbsp; 2: 5,&lt;BR /&gt;&amp;nbsp; 3: {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1: 2,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3: -25,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; -1: h'6F67957900E6BBEC39838F015E3F5D6918F5A8D76E401828363E51F6C2565412',&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; -2: h'27E8B11854CE667B8EE19DF3A3DEE4A3F0DB43809811C3A93F2E9C0293E466AA'&lt;BR /&gt;&amp;nbsp; },&lt;BR /&gt;&amp;nbsp; 6: h'746BE172CD2402CFFCC94734BC98D16A'&lt;BR /&gt;}&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;Using the table at &lt;A href="https://fidoalliance.org/specs/fido-v2.2-rd-20230321/fido-client-to-authenticator-protocol-v2.2-rd-20230321.html#authnrClientPin-cmd-dfn" target="_blank" rel="noopener"&gt;Client to Authenticator Protocol (CTAP)&lt;/A&gt; to translate the numeric keys we have:
&lt;UL&gt;
&lt;LI&gt;key 1 = pinUvAuthProtocol&lt;/LI&gt;
&lt;LI&gt;key 2 = subCommand&lt;/LI&gt;
&lt;LI&gt;key 3 = keyAgreement&lt;/LI&gt;
&lt;LI&gt;key 6 = pinHashEnc&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;After the translation, the payload says:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;{&lt;/P&gt;
&lt;P&gt;&amp;nbsp; "&lt;STRONG&gt;pinUvAuthProtocol&lt;/STRONG&gt;": 1,&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;subCommand&lt;/STRONG&gt;": 5,&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;keyAgreement&lt;/STRONG&gt;": {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1: 2,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3: -25,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; -1: h'6F67957900E6BBEC39838F015E3F5D6918F5A8D76E401828363E51F6C2565412',&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; -2: h'27E8B11854CE667B8EE19DF3A3DEE4A3F0DB43809811C3A93F2E9C0293E466AA'&lt;BR /&gt;&amp;nbsp; },&lt;BR /&gt;&amp;nbsp; "&lt;STRONG&gt;pinHashEnc&lt;/STRONG&gt;": h'746BE172CD2402CFFCC94734BC98D16A'&lt;BR /&gt;}&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="6"&gt;
&lt;LI&gt;The information most useful for us here is "&lt;STRONG&gt;subCommand&lt;/STRONG&gt;": 5, which as you can see from the second table in &lt;A href="https://fidoalliance.org/specs/fido-v2.2-rd-20230321/fido-client-to-authenticator-protocol-v2.2-rd-20230321.html#authnrClientPin-cmd-dfn" target="_blank" rel="noopener"&gt;Client to Authenticator Protocol (CTAP)&lt;/A&gt; tells is a &lt;STRONG&gt;getPinToken&lt;/STRONG&gt; subcommand.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;In summary, when the request begins with &lt;STRONG&gt;06 A4 01 01 02 05&lt;/STRONG&gt;, it can be identified as a PIN verification attempt. The leading byte &lt;STRONG&gt;0x06&lt;/STRONG&gt; indicates the CTAP &lt;STRONG&gt;authenticatorClientPIN&lt;/STRONG&gt; command. The next byte &lt;STRONG&gt;A4&lt;/STRONG&gt; shows that the CBOR payload is a map with four fields. Within that map, the sequence &lt;STRONG&gt;01 01&lt;/STRONG&gt; corresponds to &lt;STRONG&gt;pinUvAuthProtocol = 1&lt;/STRONG&gt;, and &lt;STRONG&gt;02 05&lt;/STRONG&gt; corresponds to &lt;STRONG&gt;subCommand = 5&lt;/STRONG&gt;. In the Client PIN command set, subcommand &lt;STRONG&gt;5&lt;/STRONG&gt; represents &lt;STRONG&gt;getPinToken&lt;/STRONG&gt;, which is used during PIN verification. Together, this byte pattern reliably indicates that the operation is a PIN-based authentication step rather than a standard assertion request.&lt;/P&gt;
&lt;P&gt;Turn on &lt;STRONG&gt;Annotate&lt;/STRONG&gt; if you want the CBOR Playground site to show how each byte is interpreted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="mcetoc_1jlkjdlpu_13" class="lia-linked-item"&gt;&lt;a id="community--1-AuthenticatorGetAssertionoperation" class="lia-anchor"&gt;&lt;/a&gt;Authenticator GetAssertion operation&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Ctap Usb Send Receive&lt;/STRONG&gt; events (Event ID 2225) where the &lt;STRONG&gt;Request&lt;/STRONG&gt; begins with &lt;STRONG&gt;0x02&lt;/STRONG&gt; indicate an &lt;STRONG&gt;authenticatorGetAssertion&lt;/STRONG&gt; CTAP2 Operation. The encoded payload includes the RpId and ClientDataHash.&lt;/P&gt;
&lt;P&gt;If the &lt;STRONG&gt;Response&lt;/STRONG&gt; begins with &lt;STRONG&gt;0x00 &lt;/STRONG&gt;it was successful. Included in the CBOR payload is the &lt;STRONG&gt;id&lt;/STRONG&gt; (Credential ID) and the rpIdHash&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H2 id="mcetoc_1jlkjdlpu_14" class="lia-linked-item"&gt;&lt;a id="community--1-Responseprocessing" class="lia-anchor"&gt;&lt;/a&gt;Response processing&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;Ctap GetAssertion completed&lt;/STRONG&gt; event (Event ID 2102) tells us that the authenticator successfully completed a GetAssertion operation and returned a valid signed assertion to Windows.&lt;/P&gt;
&lt;P&gt;Included in the response payload are security key device information, status of the operation (6673746174757300 stands for status = 0), the credential used and authenticator data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The &lt;STRONG&gt;Cbor decode GetAssertion response&lt;/STRONG&gt; event (Event ID 1104) is logged when the authenticator successfully returns a WebAuthN assertion for the relying party using a particular credential.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This is one of the best events to track successful authentication because the important fields are already parsed out.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The &lt;STRONG&gt;RpIdHash&lt;/STRONG&gt; of 356C9ED4A09321B9695F1EAF918203F1B55F689DA61FBC96184C157DDA680C81 is the SHA-256 hash of “login.microsoft.com”&lt;/LI&gt;
&lt;LI&gt;A &lt;STRONG&gt;Flags&lt;/STRONG&gt; value of 0x85 means 0x80 + 0x04 + 0x01
&lt;UL&gt;
&lt;LI&gt;0x01: UP (the user was present and interacted with the key)&lt;/LI&gt;
&lt;LI&gt;0x04: UV (user verification succeeded, which in this scenario means PIN was successfully validated)&lt;/LI&gt;
&lt;LI&gt;0x80: ED (extension data was included in the assertion)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;The&amp;nbsp;&lt;STRONG&gt;CredentialId&lt;/STRONG&gt; of EDE6F30E65534AB78BB0992B8E6D6634 when Base64 encoded, will match the key identifier in Entra.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-2" border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.9074%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Therefore, &lt;STRONG&gt;Cbor decode GetAssertion response&lt;/STRONG&gt; events (Event ID 1104) will tell you which users successfully authenticated to the Windows device using a FIDO2 security key.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, the &lt;STRONG&gt;WebAuthN Ctap GetAssertion completed&lt;/STRONG&gt; event (Event ID 1004) tells us that WebAuthN GetAssertion operation completed successfully for this TransactionId.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-right"&gt;&lt;A href="#community--1-ToC" target="_blank" rel="noopener" data-lia-auto-title="Top👆" data-lia-auto-title-active="0"&gt;Top👆&lt;/A&gt;&lt;/P&gt;
&lt;H1 id="mcetoc_1jlkjdlpu_15" class="lia-linked-item"&gt;&lt;a id="community--1-Tyingitalltogether" class="lia-anchor"&gt;&lt;/a&gt;Tying it all together&lt;/H1&gt;
&lt;P&gt;I started out by outlining what my customer’s monitoring goals were; the table below summarizes the events recommended for monitoring:&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;What to Monitor&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Event&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Each use of a FIDO2 security key on a Windows client device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cbor encode GetAssertion request &lt;/STRONG&gt;(Event ID 1103)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Filter for events where:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Request&lt;/STRONG&gt; begins with &lt;STRONG&gt;0x02&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="background-color: rgba(0, 0, 0, 0); color: rgb(30, 30, 30);"&gt;AllowCredentialCount&lt;/STRONG&gt;&lt;SPAN style="background-color: rgba(0, 0, 0, 0); color: rgb(30, 30, 30);"&gt; is greater than zero.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Parse&amp;nbsp;&lt;STRONG&gt;Request&lt;/STRONG&gt; for credential Id.&lt;/P&gt;
&lt;P&gt;Base64 encode credential Id to match key identifier and user in Entra ID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;All attempts, both successful and unsuccessful, when a PIN was tried to unlock a credential on the FIDO2 security key on the device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Ctap Usb Send Receive&lt;/STRONG&gt; (Event ID 2225)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Filter for events where &lt;STRONG&gt;Request&lt;/STRONG&gt; starts with &lt;STRONG&gt;0x06A401010205&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;&lt;STRONG&gt;Response&lt;/STRONG&gt; property indicates result.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Which user successfully authenticated to the Windows device using their FIDO2 security key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Cbor decode GetAssertion response&lt;/STRONG&gt; (Event ID 1104)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Base64 encode credential Id to match key identifier and user in Entra ID.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The techniques outlined in this document show how to identify individual FIDO2 credentials, track PIN verification attempts, and conclusively determine which user authenticated to a Windows device using a security key. With this approach, passwordless authentication becomes not only more secure, but also more observable and supportable in enterprise environments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 11:10:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/auditing-fido2-authentication-for-windows-sign-in/ba-p/4509702</guid>
      <dc:creator>LijuV</dc:creator>
      <dc:date>2026-04-09T11:10:08Z</dc:date>
    </item>
    <item>
      <title>Azure Database Security Newsletter - April 2026</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/azure-database-security-newsletter-april-2026/ba-p/4507226</link>
      <description>&lt;P&gt;Welcome to the quarterly edition of Azure Database Platform Security Newsletter. In this newsletter we highlight the importance of strong encryption for data security, and call out recent encryption, key management, and auditing enhancements designed to help you strengthen your security posture while simplifying operational management.&lt;/P&gt;
&lt;P&gt;Data is one of the most critical assets organizations manage, and protecting it is essential to maintaining trust, resilience, and long‑term success. As cyber threats continue to evolve and regulatory expectations increase, strong encryption has become a foundational requirement rather than an optional safeguard.&lt;/P&gt;
&lt;P&gt;Encryption protects sensitive data across its entire lifecycle. Data is encrypted at rest using Transparent Data Encryption (TDE) to protect stored information, in transit using Transport Layer Security (TLS) to secure data as it moves across your application and server, and in use through Always Encrypted to help ensure data remains protected even from high-privileged users. Together, these capabilities reduce risk and support compliance obligations.&lt;/P&gt;
&lt;H1&gt;Feature highlights 💡&lt;/H1&gt;
&lt;H2&gt;Customer-Managed Keys in Fabric SQL Database&lt;/H2&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://blog.fabric.microsoft.com/en-us/blog/customer-managed-keys-cmk-in-fabric-sql-database-generally-available?ft=All" target="_blank" rel="noopener"&gt;Customer-Managed Keys (CMK) are now generally available for Fabric SQL Database&lt;/A&gt;, allowing you to use Azure Key Vault keys to encrypt all workspace data, including all SQL Database data. This feature gives organizations greater control over key management and helps meet data governance and encryption requirements. More information on &lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=1ffSH5g1t-Y" target="_blank" rel="noopener"&gt;How to encrypt Fabric SQL Database with Customer Managed Keys (Video)&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Versionless keys for Transparent Data Encryption in Azure SQL Database&lt;/H2&gt;
&lt;P&gt;Azure SQL Database now lets you use &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/azuresqlblog/versionless-keys-for-transparent-data-encryption-in-azure-sql-database-generally/4502969" target="_blank" rel="noopener" data-lia-auto-title="versionless key URIs for Transparent Data Encryption (TDE)" data-lia-auto-title-active="0"&gt;versionless key URIs for Transparent Data Encryption (TDE)&lt;/A&gt; with customer-managed keys, automatically applying the latest enabled key from Azure Key Vault or Managed HSM. This update simplifies encryption management.&lt;/P&gt;
&lt;H2&gt;Auditing in Fabric SQL Database&lt;/H2&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/fabric/database/sql/auditing" target="_blank"&gt;Auditing for Fabric SQL Database&lt;/A&gt; is now generally available. Organizations can track and log database activities, addressing questions about data access for compliance, threat detection, and forensic analysis. Audit logs are stored in One Lake, and access is controlled by Fabric workspace roles and SQL permissions.&lt;/P&gt;
&lt;H1&gt;Best Practices Corner&amp;nbsp;&lt;/H1&gt;
&lt;H5&gt;Retain all historical TDE keys and key versions&lt;/H5&gt;
&lt;P&gt;Always keep all historical Transparent Data Encryption (TDE) keys and their versions. Databases and backups remain encrypted with the key version that was active at the time of encryption. Restoring an older database requires access to the exact key version used. Deleting older keys or versions can make database restore impossible and result in permanent data loss. See &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/azuresqlblog/everything-you-need-to-know-about-tde-key-management-for-database-restore/4416564" target="_blank" rel="noopener" data-lia-auto-title="Everything you need to know about TDE key management for database restore" data-lia-auto-title-active="0"&gt;Everything you need to know about TDE key management for database restore&lt;/A&gt;.&lt;/P&gt;
&lt;H5&gt;Apply the Principle of Least Privilege&lt;/H5&gt;
&lt;P&gt;Always grant users, applications, and services the minimum level of access required to perform their database tasks. Avoid broad administrative or owner-level permissions unless absolutely necessary. Regularly review, restrict, and remove excessive or unused privileges to reduce the attack surface and limit the impact of compromised credentials or configuration errors. This control aligns with established security standards such as &lt;A class="lia-external-url" href="https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final" target="_blank" rel="noopener"&gt;NIST SP 800‑53 (AC‑6: Least Privilege)&lt;/A&gt;, &lt;A class="lia-external-url" href="https://www.cisecurity.org/controls/access-control-management" target="_blank" rel="noopener"&gt;CIS Critical Security Controls&lt;/A&gt;, &lt;A class="lia-external-url" href="https://www.iso.org/standard/75652.html" target="_blank" rel="noopener"&gt;ISO/IEC 27002&lt;/A&gt;, and &lt;A class="lia-external-url" href="https://cheatsheetseries.owasp.org/cheatsheets/Database_Security_Cheat_Sheet.html" target="_blank" rel="noopener"&gt;OWASP database security guidance&lt;/A&gt;.&lt;/P&gt;
&lt;H5&gt;Enable Auditing on Azure SQL and SQL Server&lt;/H5&gt;
&lt;P&gt;Always enable auditing on Azure SQL to record database activities for security monitoring, compliance, and forensic investigation. Auditing provides visibility into database access and changes, helping detect unauthorized or suspicious behavior and supporting incident response and regulatory requirements. See &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/azure-sql/database/auditing-overview?view=azuresql" target="_blank" rel="noopener"&gt;Auditing - Azure SQL Database&lt;/A&gt;.&lt;/P&gt;
&lt;H1&gt;Blogs and Video Spotlight 🅱️&lt;/H1&gt;
&lt;P&gt;In the last three months, we've published blog posts on major releases and features. These updates offer practical insights and highlight the latest in data security and database management.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/azuresqlblog/why-ledger-verification-is-non-negotiable/4485290" target="_blank" rel="noopener" data-lia-auto-title="Why ledger verification is non-negotiable" data-lia-auto-title-active="0"&gt;Why ledger verification is non-negotiable&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://devblogs.microsoft.com/cosmosdb/how-to-enable-microsoft-entra-id-for-azure-cosmos-db-nosql/" target="_blank" rel="noopener"&gt;How to Enable Microsoft Entra ID for Azure Cosmos DB (NoSQL)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/azuresqlblog/why-developers-and-dbas-love-sql%E2%80%99s-dynamic-data-masking-series-part-1/4498450" target="_blank" rel="noopener" data-lia-auto-title="Why Developers and DBAs love SQL’s Dynamic Data Masking (Series-Part 1)" data-lia-auto-title-active="0"&gt;Why Developers and DBAs love SQL’s Dynamic Data Masking (Series-Part 1)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/sqlserver/announcing-preview-of-bulkadmin-role-support-for-sql-server-on-linux/4503676" target="_blank" rel="noopener" data-lia-auto-title="Announcing Preview of bulkadmin role support for SQL Server on Linux" data-lia-auto-title-active="0"&gt;Announcing Preview of bulkadmin role support for SQL Server on Linux&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/azuresqlblog/zero-trust-for-data-make-microsoft-entra-authentication-for-sql-your-policy-base/4506679" target="_blank" rel="noopener" data-lia-auto-title="Zero Trust for data: Make Microsoft Entra authentication for SQL your policy baseline" data-lia-auto-title-active="0"&gt;Zero Trust for data: Make Microsoft Entra authentication for SQL your policy baseline&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Community &amp;amp; Events 👥&lt;/H1&gt;
&lt;P&gt;The data platform security team will be on-site at several upcoming events. Come and say hi!&lt;/P&gt;
&lt;H5&gt;Previous events&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://sqlkonferenz.de/" target="_blank" rel="noopener"&gt;SQL Konferenz&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://fabriccon.com/" target="_blank" rel="noopener"&gt;FABCON 26 - Microsoft Fabric Community Conference - FABCON&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://sqlcon.us/" target="_blank" rel="noopener"&gt;SQLCON - Microsoft SQL Community Conference - SQLCON&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;Upcoming events&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://sqlbits.com/" target="_blank" rel="noopener"&gt;SQLBits&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://datagrillen.com/" target="_blank" rel="noopener"&gt;DataGrillen&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;Call to action 📢&lt;/H1&gt;
&lt;P&gt;Take 15 minutes this week to validate your database encryption posture: confirm TDE is enabled, review your key management plan (including retaining historical key versions), and ensure TLS is enforced for all connections. If you are using Fabric SQL Database, consider enabling Customer-Managed Keys and turning on Auditing to strengthen governance and investigation readiness. Share this newsletter with your security and DBA partners and align on one concrete improvement you can complete.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 08:08:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/azure-database-security-newsletter-april-2026/ba-p/4507226</guid>
      <dc:creator>PieterVanhove</dc:creator>
      <dc:date>2026-04-01T08:08:13Z</dc:date>
    </item>
    <item>
      <title>Check This Out! (CTO!) Guide (March 2026)</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-march-2026/ba-p/4506999</link>
      <description>&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/users/tysonpaul/322025" data-lia-auto-title="Member: TysonPaul | Microsoft Community Hub" data-lia-auto-title-active="0" target="_blank"&gt;Member: TysonPaul | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/itopstalkblog/automating-large%E2%80%91scale-data-management-with-azure-storage-actions/4496766" target="_blank" rel="noopener noreferrer"&gt;Automating Large‑Scale Data Management with Azure Storage Actions&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/itopstalk/blog/itopstalkblog" target="_blank" rel="noopener noreferrer"&gt;ITOps Talk&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/1nataraj/1439120" target="_blank" rel="noopener noreferrer"&gt;1Nataraj&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/25/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Storage Actions is a fully managed, serverless automation platform that simplifies large-scale data management in Azure Blob and Data Lake Storage. It enables users to automate tasks such as tagging, tiering, deletion, and applying immutability based on customizable conditions—without custom code or infrastructure. Administrators can centrally define tasks and assign them across multiple storage accounts, with built-in preview, monitoring, and audit features. Use cases include compliance, cost optimization, and metadata management, making it ideal for organizations managing millions of items across vast storage estates. Azure Storage Actions is available in over 40 Azure regions.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/itopstalkblog/migration-modernization--agentic-tools/4497193" target="_blank" rel="noopener noreferrer"&gt;Migration, Modernization &amp;amp; Agentic Tools&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/itopstalk/blog/itopstalkblog" target="_blank" rel="noopener noreferrer"&gt;ITOps Talk&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/orinthomas/251291" target="_blank" rel="noopener noreferrer"&gt;OrinThomas&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/25/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article discusses how agentic tools, such as those in Azure Copilot and GitHub Copilot, transform cloud migration and modernization from one-time projects into ongoing, autonomous systems. These tools dynamically discover environments, recommend modernization paths, automate migration steps, and continuously optimize workloads for cost, performance, security, and compliance. By embedding governance and leveraging real-time telemetry, agentic tools reduce manual effort, minimize errors, and ensure migrations are efficient, secure, and aligned with enterprise standards, providing continuous improvement post-migration.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/finopsblog/what%E2%80%99s-new-in-finops-toolkit-13-%E2%80%93-january-2026/4493090" target="_blank" rel="noopener noreferrer"&gt;What’s new in FinOps toolkit 13 – January 2026&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/finopsblog" target="_blank" rel="noopener noreferrer"&gt;FinOps&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/michael_flanakin/3099145" target="_blank" rel="noopener noreferrer"&gt;Michael_Flanakin&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/09/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The January 2026 update to the FinOps toolkit focuses on stability, usability, and community engagement. Key enhancements include improved documentation, new features like configurable Key Vault purge protection, and expanded support for Parquet format and compression in Cost Management exports via PowerShell. Security, reliability, and extensibility have been strengthened for FinOps hubs, with numerous bug fixes across Power BI reports, workbooks, and the Azure Optimization Engine. The release highlights ongoing community involvement, upcoming features like AI automation, and premium services to help organizations deploy and scale the toolkit effectively.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/managed-identity-on-sql-server-on-prem-the-end-of-stored-secrets/4496450" target="_blank" rel="noopener noreferrer"&gt;Managed Identity on SQL Server On-Prem: The End of Stored Secrets&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/cis/blog/coreinfrastructureandsecurityblog" target="_blank" rel="noopener noreferrer"&gt;Core Infrastructure and Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ryadb/193779" target="_blank" rel="noopener noreferrer"&gt;RyadB&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/23/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; **Summary:** The article explains how SQL Server 2025 on-premises, when connected to Azure Arc, can use Managed Identity to access Azure resources without storing secrets like SAS tokens or keys. This approach eliminates risks of secret storage, rotation, and auditing complexity by leveraging Microsoft Entra ID for identity management and RBAC for permissions. The article details configuration steps, migration from stored credentials, troubleshooting, and current limitations, highlighting improved security and simplified management for on-prem SQL Server accessing Azure services.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/running-text-to-image-and-text-to-video-with-comfyui-and-nvidia-h100-gpu/4497978" target="_blank" rel="noopener noreferrer"&gt;Running Text to Image and Text to Video with ComfyUI and Nvidia H100 GPU&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/cis/blog/coreinfrastructureandsecurityblog" target="_blank" rel="noopener noreferrer"&gt;Core Infrastructure and Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/houssemdellai/632520" target="_blank" rel="noopener noreferrer"&gt;HoussemDellai&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/27/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; This article provides a step-by-step guide for setting up and running ComfyUI, a node-based interface for AI-powered text-to-image and text-to-video generation, on Azure VMs with Nvidia H100 GPUs. It details both automated (Terraform) and manual setup methods, including installing drivers, dependencies, and downloading required models. The guide explains accessing ComfyUI’s web portal, workflow configuration, and model management to create high-quality images and videos efficiently. It also includes important notes about GPU driver compatibility and offers links to official documentation and scripts for further reference.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurenetworkingblog/unlock-outbound-traffic-insights-with-azure-standardv2-nat-gateway-flow-logs/4493138" target="_blank" rel="noopener noreferrer"&gt;Unlock outbound traffic insights with Azure StandardV2 NAT Gateway flow logs&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurenetworkingblog" target="_blank" rel="noopener noreferrer"&gt;Azure Networking&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/cozhang/2733179" target="_blank" rel="noopener noreferrer"&gt;cozhang&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/06/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article introduces Azure’s StandardV2 NAT Gateway, highlighting its new features such as zone-redundancy, enhanced performance, dual-stack support, and, notably, flow logs. Flow logs provide detailed visibility into outbound traffic, enabling security auditing, compliance, usage analytics, and troubleshooting. The article explains how to enable and use flow logs to diagnose connectivity issues and optimize network architecture. It emphasizes the importance of flow logs for monitoring established outbound connections and offers troubleshooting steps for connection drops, recommending best practices for resilient Azure deployments.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurehighperformancecomputingblog/centralized-cluster-performance-metrics-with-reframe-hpc-and-azure-log-analytics/4488077" target="_blank" rel="noopener noreferrer"&gt;Centralized cluster performance metrics with ReFrame HPC and Azure Log Analytics&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurehighperformancecomputingblog" target="_blank" rel="noopener noreferrer"&gt;Azure High Performance Computing (HPC)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jimpaine/335139" target="_blank" rel="noopener noreferrer"&gt;jimpaine&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/06/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article outlines how to integrate ReFrame HPC, a flexible high-performance computing testing framework, with Azure Log Analytics for centralized performance monitoring across diverse clusters and environments. It details deploying necessary Azure resources, configuring ReFrame for HTTP logging, and running performance tests with results sent to Log Analytics. This integration enables unified, standardized metrics collection, cross-cluster comparisons, trend analysis, and improved system visibility—supporting migration, development, and operational assurance in heterogeneous HPC environments.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurehighperformancecomputingblog/azure-recognized-as-an-nvidia-cloud-exemplar-setting-the-bar-for-ai-performance-/4495747" target="_blank" rel="noopener noreferrer"&gt;Azure Recognized as an NVIDIA Cloud Exemplar, Setting the Bar for AI Performance in the Cloud&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurehighperformancecomputingblog" target="_blank" rel="noopener noreferrer"&gt;Azure High Performance Computing (HPC)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/fernando_aznar/2446399" target="_blank" rel="noopener noreferrer"&gt;Fernando_Aznar&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft Azure has been recognized as the first NVIDIA Exemplar Cloud for its world-class, end-to-end AI workload performance, now validated for both H100 and next-generation GB300 (Blackwell) systems. This designation reflects Azure’s optimized full-stack infrastructure—including compute, networking, and software integration—delivering predictable, efficient, and scalable AI training at production scale. Customers benefit from faster time-to-train, improved ROI, and confidence in Azure’s readiness for advanced AI workloads, ensuring consistent high performance from proof-of-concept to deployment without sacrificing cloud flexibility or manageability.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/reference-architecture-for-highly-available-multi-region-azure-kubernetes-servic/4490479" target="_blank" rel="noopener noreferrer"&gt;Reference Architecture for Highly Available Multi-Region Azure Kubernetes Service (AKS)&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearchitectureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/rgarofalo/3339583" target="_blank" rel="noopener noreferrer"&gt;rgarofalo&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/03/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article presents a reference architecture for highly available, multi-region Azure Kubernetes Service (AKS) deployments. It compares active/active, active/passive, and deployment stamp models, detailing their trade-offs in availability, complexity, and cost. Key components include Azure Front Door for global traffic routing, geo-replicated data services, centralized monitoring, and consistent security controls. The architecture emphasizes resilience through fault isolation, automated recovery, and regular testing. It offers practical guidance for cloud architects to design AKS platforms that withstand regional outages, ensuring business continuity and scalable operations across Azure regions.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/reactive-incident-response-with-azure-sre-agent-from-alert-to-resolution-in-minu/4492938" target="_blank" rel="noopener noreferrer"&gt;Reactive Incident Response with Azure SRE Agent: From Alert to Resolution in Minutes&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearchitectureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/sabyasachi-samaddar/1126636" target="_blank" rel="noopener noreferrer"&gt;Sabyasachi-Samaddar&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; **Summary:** The article details how Azure SRE Agent revolutionizes incident response by automating investigation and triage as soon as an alert fires, reducing resolution times from hours to minutes. Through two real-world scenarios—a SQL connectivity outage and a VM CPU spike—the agent autonomously diagnosed issues, proposed remediations, and required minimal human intervention. Custom Incident Response Plans and instructions enable context-aware, consistent, and rapid resolutions, with automated post-incident documentation. Key benefits include faster MTTR, reduced manual toil, and improved knowledge capture, though some technical challenges remain. Azure SRE Agent is currently in preview.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/askds/cross-forest-enrollment-%E2%80%93-pkisync-ps1/4463954" target="_blank" rel="noopener noreferrer"&gt;Cross Forest Enrollment – PKISync.PS1&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/askds" target="_blank" rel="noopener noreferrer"&gt;Ask the Directory Services Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/manuel_alvarez_v/1972690" target="_blank" rel="noopener noreferrer"&gt;Manuel_Alvarez_V&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/19/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article explains how to use the PKISync.ps1 PowerShell script for cross-forest certificate enrollment in Active Directory environments. PKISync synchronizes PKI-related objects, such as certificate templates and CA configurations, from a source forest to a target forest, enabling certificate requests across forests. It details the setup requirements, including two-way forest trusts, LDAP referral configuration, and certificate publishing. Although PKISync is considered legacy, automating its use can facilitate simple cross-forest enrollment, but CEP/CES is recommended for modern, secure deployments. The article concludes with best practices and automation tips for PKISync.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/askds/what%E2%80%99s-new-in-windows-group-policy-preferences-debug-logging/4497060" target="_blank" rel="noopener noreferrer"&gt;What’s New in Windows Group Policy Preferences Debug Logging&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/askds" target="_blank" rel="noopener noreferrer"&gt;Ask the Directory Services Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/tagoren/1668477" target="_blank" rel="noopener noreferrer"&gt;TagoreN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/27/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article outlines a new feature in Windows 11 24H2 and 25H2 (from February 2026 preview updates) that allows administrators to enable Group Policy Preferences (GPP) debug logging directly through Local Group Policy, not just domain-based GPOs. This simplifies troubleshooting by allowing detailed logging on client devices without domain reliance. The article explains how to configure logging, manage trace file locations, and set necessary permissions. Overall, this update enhances flexibility and efficiency for IT professionals managing and debugging GPP issues on Windows client devices.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/public-preview-restrict-usage-of-user-delegation-sas-to-an-entra-id-identity/4497196" target="_blank" rel="noopener noreferrer"&gt;Public Preview: Restrict usage of user delegation SAS to an Entra ID identity&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurestorageblog" target="_blank" rel="noopener noreferrer"&gt;Azure Storage&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ellievail/3335667" target="_blank" rel="noopener noreferrer"&gt;ellievail&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has announced the public preview of user-bound user delegation SAS for Azure Storage, enhancing security by restricting SAS token usage to a specific Microsoft Entra ID identity. This feature extends user delegation SAS, requiring the end user to authenticate with Entra ID to access storage resources. It supports cross-tenant scenarios and incurs no additional cost beyond standard storage transactions. User-bound SAS is available via REST APIs, SDKs, PowerShell, and CLI for all GPv2 storage accounts in public regions, with detailed steps provided for setup and role assignment.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/azure-migrate-now-supporting-premium-ssd-v2-ultra-and-zrs-disks-as-targets/4495332" target="_blank" rel="noopener noreferrer"&gt;Azure Migrate: Now Supporting Premium SSD V2, Ultra and ZRS Disks as Targets&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurestorageblog" target="_blank" rel="noopener noreferrer"&gt;Azure Storage&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/lakshya_jalan/3335140" target="_blank" rel="noopener noreferrer"&gt;Lakshya_Jalan&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Migrate now supports Premium SSD v2, Ultra Disk, and ZRS Disks as migration targets, with Premium SSD v2 and ZRS generally available and Ultra Disk in public preview. This update enhances assessment and migration by enabling tailored recommendations based on workload performance needs, offering greater flexibility, performance, and resiliency. Users can now migrate demanding, mission-critical workloads to Azure using these advanced disk options, benefiting from features like zonal redundancy and customizable performance. The enhancements streamline migrations and ensure optimal resource alignment, supporting petabytes of data already migrated during the preview phase.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/public-preview-automatic-zone-balance-for-virtual-machine-scale-sets/4494476" target="_blank" rel="noopener noreferrer"&gt;Public Preview: Automatic zone balance for Virtual Machine Scale Sets&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurecompute" target="_blank" rel="noopener noreferrer"&gt;Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/hilarywang/1637159" target="_blank" rel="noopener noreferrer"&gt;HilaryWang&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/17/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure has introduced the public preview of automatic zone balance for Virtual Machine Scale Sets, which automatically monitors and redistributes VM instances across availability zones to maintain optimal resiliency. This feature addresses imbalances that can occur over time, minimizing the impact of zone failures without manual intervention. The system uses health checks, respects instance protection policies, and ensures workload capacity during rebalancing. Automatic instance repair is also enabled by default. Users can join the preview by enabling the feature and meeting specific prerequisites. This capability reduces operational overhead while enhancing workload reliability and zone-level resilience.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/azure-automated-virtual-machine-recovery-minimizing-downtime/4483166" target="_blank" rel="noopener noreferrer"&gt;Azure Automated Virtual Machine Recovery: Minimizing Downtime&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurecompute" target="_blank" rel="noopener noreferrer"&gt;Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jon_andoni_baranda/3305512" target="_blank" rel="noopener noreferrer"&gt;Jon_Andoni_Baranda&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/04/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Automated Virtual Machine Recovery is a built-in Azure feature that minimizes VM downtime through fast, intelligent, and automated recovery processes. Without requiring customer setup, it continuously monitors VM health, rapidly detects failures, diagnoses issues, and applies the optimal recovery action, all without customer intervention. Leveraging detailed recovery event annotations, it provides deep visibility into incident timelines and helps optimize recovery strategies. Over the past 18 months, this system has halved average VM downtime, strengthening business continuity, reducing financial impact, and reinforcing customer trust in Azure’s reliable cloud platform.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-resolve-device-noncompliance-with-mobile-threat-defense-partner-apps/4491669" target="_blank" rel="noopener noreferrer"&gt;Support tip: Resolve device noncompliance with Mobile Threat Defense partner apps&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftintune/blog/intunecustomersuccess" target="_blank" rel="noopener noreferrer"&gt;Intune Customer Success&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/intune_support_team/226779" target="_blank" rel="noopener noreferrer"&gt;Intune_Support_Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/02/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; This article provides guidance for resolving device noncompliance issues when using Mobile Threat Defense (MTD) partner apps, like Microsoft Defender for Endpoint, with Microsoft Intune. It outlines troubleshooting steps for users to restore compliance—installing, activating, refreshing, or reinstalling the MTD app—and checking compliance status. It also details simplified remediation workflows for iOS/iPadOS and methods for resetting the MTD connection on Android if sign-out is blocked, helping users regain access to work or school resources and reducing support overhead.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/how-to-enable-https-support-for-microsoft-connected-cache-for-enterprise-and-edu/4496173" target="_blank" rel="noopener noreferrer"&gt;How to enable HTTPS support for Microsoft Connected Cache for Enterprise and Education&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftintune/blog/intunecustomersuccess" target="_blank" rel="noopener noreferrer"&gt;Intune Customer Success&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/intune_support_team/226779" target="_blank" rel="noopener noreferrer"&gt;Intune_Support_Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/20/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Starting June 16, 2026, Intune will require HTTPS for Microsoft Connected Cache when delivering Win32 apps. To maintain caching benefits and reduce bandwidth, administrators must configure HTTPS on Connected Cache nodes using a CA-signed TLS certificate. The guide details generating a CSR on the node, signing and importing the certificate, and validating HTTPS on both Windows and Linux hosts. It also covers troubleshooting, maintenance, and renewal. Without HTTPS, devices will revert to using the CDN for Intune app downloads. Other content types remain unaffected. Early configuration ensures seamless transition and continued performance benefits.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/fasttrackblog/the-copilot-resource-guide-to-share-with-your-employees/4495989" target="_blank" rel="noopener noreferrer"&gt;The Copilot resource guide to share with your employees&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/fasttrack/blog/fasttrackblog" target="_blank" rel="noopener noreferrer"&gt;FastTrack&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/juliehersum/2538158" target="_blank" rel="noopener noreferrer"&gt;JulieHersum&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/19/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article introduces the "Essential Copilot resource hubs for employees," a centralized guide designed to streamline Microsoft Copilot onboarding and support. It helps adoption leaders structure learning paths, IT admins share resources efficiently, and all employees access consistent guidance. The guide consolidates key Microsoft Copilot resources, making it easier for organizations to accelerate adoption and customize internal policies. Additional support is available through FastTrack and the Microsoft 365 Accelerator site, offering expert guidance, templates, and personalized assistance to boost Copilot deployment and change management efforts.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/fasttrackblog/copilot-adoption-move-your-org-from-pilot-to-production-with-this-guide/4495997" target="_blank" rel="noopener noreferrer"&gt;Copilot adoption: Move your org from pilot to production with this guide&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/fasttrack/blog/fasttrackblog" target="_blank" rel="noopener noreferrer"&gt;FastTrack&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/juliehersum/2538158" target="_blank" rel="noopener noreferrer"&gt;JulieHersum&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/19/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article introduces a comprehensive guide for IT admins and Copilot adoption leads to streamline the rollout of Microsoft 365 Copilot. Organized around the adoption lifecycle (plan, build, operate), the guide highlights eight essential resource hubs, practical rollout steps, and audience-specific resources to ensure effective, governed adoption. It also promotes Microsoft FastTrack, which offers expert support, self-service resources, and personalized assistance to accelerate and scale Copilot deployment at no extra cost.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurevirtualdesktopblog/azure-virtual-desktop-is-now-available-in-us-gov-texas-in-azure-government/4485723" target="_blank" rel="noopener noreferrer"&gt;Azure Virtual Desktop is now available in US Gov Texas in Azure Government&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurevirtualdesktopblog" target="_blank" rel="noopener noreferrer"&gt;Azure Virtual Desktop&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ron_coleman/180890" target="_blank" rel="noopener noreferrer"&gt;Ron_Coleman&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/04/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Virtual Desktop is now available in the USGov Texas region of Azure Government, offering customers a new option for deploying secure and flexible virtual desktop environments. This expansion enables improved connection performance, reduced latency, and enhanced responsiveness by allowing host pool creation directly in the region. It supports mission needs, geographic distribution, and regulatory requirements, while maintaining Azure Government’s compliance and security standards. Customers can now leverage multiple regions for greater flexibility and performance in their virtual desktop deployments.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurevirtualdesktopblog/rdp-shortpath-udp-over-private-link-is-now-generally-available/4494644" target="_blank" rel="noopener noreferrer"&gt;RDP Shortpath (UDP) over Private Link is now generally available&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurevirtualdesktopblog" target="_blank" rel="noopener noreferrer"&gt;Azure Virtual Desktop&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/rinku_dalwani/1321337" target="_blank" rel="noopener noreferrer"&gt;Rinku_Dalwani&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/17/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Virtual Desktop now supports UDP-based RDP Shortpath over Private Link, enabling direct, high-performance RDP connections between session hosts and clients using private IPs. This complements existing TCP connectivity, helping customers with strict private network boundaries. Administrators must explicitly enable UDP in Azure portal settings to use this feature. The opt-in model ensures secure and predictable transport, giving full control over UDP introduction. This enhancement is recommended for customers needing precise routing and policy enforcement in regulated environments, while standard AVD connectivity remains suitable for most deployments. Full configuration guidance is available in Azure documentation.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuremigrationblog/migrating-workloads-from-aws-to-azure-a-structured-approach-for-cloud-architects/4495227" target="_blank" rel="noopener noreferrer"&gt;Migrating Workloads from AWS to Azure: A Structured Approach for Cloud Architects&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuremigrationblog" target="_blank" rel="noopener noreferrer"&gt;Azure Migration and Modernization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/rhack/2854208" target="_blank" rel="noopener noreferrer"&gt;rhack&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article outlines a structured, five-phase approach for migrating workloads from AWS to Azure, emphasizing a like-for-like architecture to minimize risk and maintain operational stability. Key phases include planning, preparation, execution, evaluation, and decommissioning, each requiring thorough documentation, stakeholder alignment, testing, and validation. The recommended migration strategy is blue/green deployment for risk mitigation. The workload team should lead the migration, supported by external Azure experts. Success depends on careful planning, phased execution, and post-migration optimization, with organizational knowledge-sharing encouraged for future improvements.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuremigrationblog/modernizing-for-the-ai-era-accelerating-application-transformation-with-agentic-/4490596" target="_blank" rel="noopener noreferrer"&gt;Modernizing for the AI Era: Accelerating Application Transformation with Agentic Tools&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuremigrationblog" target="_blank" rel="noopener noreferrer"&gt;Azure Migration and Modernization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/marcob/2856803" target="_blank" rel="noopener noreferrer"&gt;MarcoB&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/12/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article highlights the urgent need for organizations to modernize legacy applications to thrive in the AI era. Legacy systems drain resources and hinder innovation, but new agentic tools—such as GitHub Copilot, Azure Migrate, and Azure Copilot—use AI to automate and accelerate application transformation. These tools reduce manual effort, boost accuracy and safety, and make modernization accessible, empowering teams to focus on innovation. The result is faster, safer, and more consistent modernization, enabling organizations to continuously evolve their applications for intelligent, cloud-optimized environments. Practical steps and resources are provided to guide organizations in getting started.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/secure-dns-with-doh-public-preview-for-windows-dns-server/4493935" target="_blank" rel="noopener noreferrer"&gt;Secure DNS with DoH: Public Preview for Windows DNS Server&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/networkingblog" target="_blank" rel="noopener noreferrer"&gt;Networking&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jorgeca%C3%B1as/2838432" target="_blank" rel="noopener noreferrer"&gt;JorgeCañas&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/09/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has launched a public preview of DNS over HTTPS (DoH) for Windows DNS Server, enabling encrypted and authenticated DNS queries within on-premises networks. This upgrade enhances security and privacy by preventing DNS traffic from being exposed or intercepted, aligning with Zero Trust principles and U.S. federal requirements. The DoH feature, included in the February 2026 update for Windows Server 2025, is disabled by default and currently intended for evaluation only. Existing DNS functionality remains unchanged, with new tools added for DoH management. Feedback is encouraged to improve the feature before general availability.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearcblog/announcing-public-preview-simplified-machine-provisioning-for-azure-local/4496811" target="_blank" rel="noopener noreferrer"&gt;Announcing Public Preview: Simplified Machine Provisioning for Azure Local&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearcblog" target="_blank" rel="noopener noreferrer"&gt;Azure Arc&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/pragyadwivedi/1475983" target="_blank" rel="noopener noreferrer"&gt;PragyaDwivedi&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has announced the Public Preview of Simplified Machine Provisioning for Azure Local, streamlining edge infrastructure deployment. The new process centralizes configuration in Azure, requiring minimal on-site expertise—staff only need to rack, power on hardware, and insert a prepared USB. Secure provisioning uses industry standards like FIDO Device Onboarding and Azure Arc Site for consistent, automated deployments across multiple locations. IT teams manage and monitor provisioning remotely, reducing errors and speeding up setup. Once complete, machines are ready for cluster creation and workload deployment, significantly simplifying and scaling Azure Local deployments.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuretoolsblog/azure-cli-windows-msi-upgrade-issue-root-cause-mitigation-and-performance-improv/4491691" target="_blank" rel="noopener noreferrer"&gt;Azure CLI Windows MSI Upgrade Issue: Root Cause, Mitigation, and Performance Improvements&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuretoolsblog" target="_blank" rel="noopener noreferrer"&gt;Azure Tools&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/alex-wdy/1467559" target="_blank" rel="noopener noreferrer"&gt;Alex-wdy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/03/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article discusses a critical issue affecting Azure CLI upgrades on Windows using the MSI installer, where users upgrading from version 2.76.0 (or earlier) to 2.77.0 (or later) encountered startup crashes due to missing Python extension files. The root cause was a versioning conflict during upgrade, leading to incomplete installations. The article details recovery steps, recommends upgrading to version 2.83.0, and highlights improvements to the MSI upgrade process, making installations faster and more reliable by simplifying file replacement logic and eliminating slow version checks. Users are encouraged to upgrade and report issues if encountered.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/navigating-the-2025-holiday-season-insights-into-azure%E2%80%99s-ddos-defense/4495741" target="_blank" rel="noopener noreferrer"&gt;Navigating the 2025 holiday season: Insights into Azure’s DDoS defense&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog" target="_blank" rel="noopener noreferrer"&gt;Azure Network Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jdasari/3369146" target="_blank" rel="noopener noreferrer"&gt;Jdasari&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; During the 2025 holiday season, Azure observed a rise in burst-style DDoS attacks, with high-intensity, short-lived surges targeting packet processing and connection-handling layers. Most attacks were automated and brief, but the cumulative impact was operationally draining, especially for latency-sensitive sectors like gaming. Botnet-driven attacks rapidly shifted targets, exploiting inconsistent defenses. Azure DDoS Protection mitigated over 174,000 attacks, underscoring the need for always-on, automated, and layered security. Organizations are urged to standardize protections, proactively monitor, and adopt Zero Trust and multi-layered defense strategies to ensure resilience against evolving threats in 2026.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/a-practical-guide-to-azure-ddos-protection-cost-optimization/4495199" target="_blank" rel="noopener noreferrer"&gt;A Practical Guide to Azure DDoS Protection Cost Optimization&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog" target="_blank" rel="noopener noreferrer"&gt;Azure Network Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/saleembseeu/1203393" target="_blank" rel="noopener noreferrer"&gt;SaleemBseeu&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article provides strategies for optimizing Azure DDoS Protection costs. It explains the differences between DDoS Network Protection (best for large-scale, centralized management) and DDoS IP Protection (for few, specific endpoints). Key recommendations include consolidating protection plans to reduce base costs, selectively applying protection based on workload exposure, preventing unnecessary spend via regular reviews, and using cost management tools and tagging for visibility. The guide emphasizes aligning protection with actual risk and criticality, and offers scripts and checklists to support ongoing cost-efficient DDoS defense.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 30 Mar 2026 18:45:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-march-2026/ba-p/4506999</guid>
      <dc:creator>TysonPaul</dc:creator>
      <dc:date>2026-03-30T18:45:30Z</dc:date>
    </item>
    <item>
      <title>Implementing Intune RBAC and Scope Tags for Zero Trust and Least Privilege</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/implementing-intune-rbac-and-scope-tags-for-zero-trust-and-least/ba-p/4506889</link>
      <description>&lt;P&gt;If you’re rolling out Microsoft Intune at scale, the hardest part usually isn’t creating policies—it’s making sure the &lt;EM&gt;right&lt;/EM&gt; people can manage the &lt;EM&gt;right&lt;/EM&gt; things, without turning every admin account into a “keys to the kingdom” risk. In this guide, you’ll learn how to use Intune RBAC and Scope Tags to enforce least privilege, build clear management boundaries by region/agency/environment, and pair device compliance with Entra Conditional Access to strengthen a Zero Trust posture—plus a practical RACI approach so ownership stays clear as your environment grows.&lt;/P&gt;
&lt;H1&gt;TL;DR&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;Use Intune RBAC to align admin permissions to job responsibilities, reducing standing privilege and limiting who can change policies, apps, and security settings.&lt;/LI&gt;
&lt;LI&gt;Use Scope Tags to create visibility/management boundaries (region, agency, environment) so admins only see and manage what they own.&lt;/LI&gt;
&lt;LI&gt;Pair Intune compliance + Entra Conditional Access to enforce “access only from compliant devices / protected apps,” which supports a Zero Trust posture.&lt;/LI&gt;
&lt;LI&gt;Establish a RACI model so ownership is explicit across Endpoint, Identity, Security, Apps, AD, Help Desk, and Compliance teams.&lt;/LI&gt;
&lt;LI&gt;Track outcomes (compliance rates, blocked risky sign-ins, RBAC audit events, scope boundary effectiveness, GPO migration progress) and review on a regular cadence.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Zero Trust and Least Privilege in Modern Endpoint Management&lt;/H1&gt;
&lt;P&gt;Zero Trust is an approach to security that treats every access attempt as untrusted until it is proven otherwise. Rather than relying on “inside the network = safe,” organizations evaluate each request using signals such as user identity, device health, location, and risk, and they re-check those signals over time. In an endpoint program, Microsoft Intune supports this model by establishing device compliance, applying app protection where appropriate, and working with Conditional Access so that access decisions can depend on verified user and device posture.&lt;/P&gt;
&lt;P&gt;A practical way to describe Zero Trust is through three recurring themes: (1) make access decisions using explicit verification (strong authentication plus context and risk signals), (2) minimize privilege by granting only the access needed and reducing standing admin rights where possible, and (3) design for compromise by limiting lateral movement and reducing the impact of any single breach. These concepts align with Microsoft’s published Zero Trust guidance.&lt;/P&gt;
&lt;P&gt;Role-Based Access Control (RBAC) in Intune allows organizations to delegate administrative permissions based on roles, responsibilities, and scope. For modern endpoint environments, RBAC ensures that only authorized personnel can manage devices, deploy configurations, or access sensitive data, which is a foundational control in a Zero Trust model where access is granted based on least privilege and verified identity.&lt;/P&gt;
&lt;P&gt;By combining Intune's RBAC capabilities with Scope Tags, organizations can create visibility boundaries that align with their organizational structure, whether by region, department, business unit, or function. This prevents over-allowing permissions by assigning only the rights needed for each role, supports Zero Trust by enforcing least privilege and role-based access, and improves operational security by limiting who can manage devices and policies.&lt;/P&gt;
&lt;H1&gt;Understanding Intune RBAC Roles and Permissions&lt;/H1&gt;
&lt;P&gt;Microsoft Intune provides nine built-in RBAC roles designed to address common administrative scenarios. Each role has predefined permissions that determine what actions users can perform within the Intune environment, helping organizations delegate administrative tasks while maintaining control over access to sensitive information. The built-in roles include &lt;STRONG&gt;Intune Administrator&lt;/STRONG&gt; with full access to all Intune features and settings (&lt;EM&gt;This role should not be used for every day management tasks and should be limited to only a few individuals who would be responsible for performing more elevated tasks in the Intune Portal&lt;/EM&gt;), &lt;STRONG&gt;Policy and Profile Manager&lt;/STRONG&gt; who manages device configuration profiles and compliance policies&lt;STRONG&gt;, Application Manager&lt;/STRONG&gt; who manages mobile and managed applications, &lt;STRONG&gt;Endpoint Security Manager&lt;/STRONG&gt; who manages security and compliance features, &lt;STRONG&gt;Help Desk Operator&lt;/STRONG&gt; who performs remote tasks on users and devices&lt;STRONG&gt;, Read-Only Operator&lt;/STRONG&gt; with view-only access, &lt;STRONG&gt;School Administrator&lt;/STRONG&gt; for Windows 10 devices in Intune for Education, &lt;STRONG&gt;Intune Role Administrator&lt;/STRONG&gt; who manages custom roles and assignments, and &lt;STRONG&gt;Cloud PC roles&lt;/STRONG&gt; for managing Cloud PC features and &lt;STRONG&gt;Windows Autopatch roles&lt;/STRONG&gt; for managing updates.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Built-in Role&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Primary Permissions&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Use Case&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Application Manager&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Manages mobile and managed applications, app configuration policies, and app protection policies&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Teams responsible for deploying and managing organizational apps across devices&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Policy and Profile Manager&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Manages device configuration profiles, compliance policies, and conditional access policies&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;IT administrators configuring device settings and ensuring compliance across the organization&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Endpoint Security Manager&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Manages security baselines, endpoint detection and response, and BitLocker policies&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Security teams focused on device protection and threat mitigation&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Help Desk Operator&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Performs remote tasks including device restart, password reset, and remote lock&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;First-line support staff assisting end users with device issues&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Read-Only Operator&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;View-only access to all Intune data and reports without modification rights&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Auditors and stakeholders needing visibility without administrative capabilities&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;Beyond built-in roles, Intune supports custom roles that allow administrators to define specific permissions for users or groups based on their responsibilities. Custom roles enable fine-grained access control by selecting granular permissions for each role, ensuring users have access only to the features and data they require. For example, a custom role could grant only the 'Rotate local administrator password' permission to a specific Helpdesk Managers group, demonstrating the principle of least privilege in action.&lt;/P&gt;
&lt;P&gt;Create Custom Roles&lt;/P&gt;
&lt;P&gt;Login to the Intune Admin Portal with the Intune Administrator Role and navigate to &lt;EM&gt;Tenant Administration&amp;gt; Roles &amp;gt; All Roles &amp;gt; Create&lt;/EM&gt; then select the type of role you want to create. I will select &lt;EM&gt;“Intune Role”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Give your Custom Role a Name and a brief description.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scroll through the list of permissions as they will all be set to no by default and select the permissions relevant to the responsibility of the custom role.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have already created your Scope Tag add it here, then review and select create&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once the role is created you can select the new role and create an assignment. Give it a name and description, then select the admin group to be assigned to the role.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add the groups that the role will be managing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add your relevant Scope Tags then select create.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To take things one step further I would recommend leveraging Privileged Identity Management (PIM) for groups so that you can leverage Just-in-Time Assignments for the Intune roles.&lt;/P&gt;
&lt;P&gt;One last note on custom roles if you do not want to start from scratch with the permission sets, you can also duplicate a built-in role and modify the permissions as needed. Just select the 3 dots to the right of the role and select Duplicate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Implementing Scope Tags for Distributed IT Management&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scope Tags are labels that help control what different admins can see and manage in Microsoft Intune. By adding scope tags to Intune items like configuration profiles, apps, policies, or device groups and assigning the same labels to admins, organizations create clear boundaries, so each admin only sees the devices and settings they are responsible for. This capability is essential for distributed IT environments where different teams manage different locations, departments, or business units.&lt;/P&gt;
&lt;P&gt;Every Intune tenant includes a default scope tag that is automatically applied to all objects and admins, ensuring everything continues working smoothly even without custom tags configured. The key benefits of using scope tags include enabling distributed IT management by allowing regional or departmental admins to manage their specific resources, controlling access by limiting admin visibility to specific resources, enhancing security by preventing unauthorized access, improving organization by grouping resources by scope, and providing flexibility to support multiple administrative models.&lt;/P&gt;
&lt;P&gt;Scope tags work together with RBAC role assignments through three components: the role defining what actions admins can perform, scope tags determining which objects admins can see, and scope groups limiting which users and devices they can affect. Common use cases for scope tags include managed service providers limiting access to specific customer resources, regional IT administrators ensuring teams only manage and see objects relevant to their region, separating testing versus production environments when a dedicated test tenant is not available, and separating Azure Virtual Desktop resources for AVD administrators.&lt;/P&gt;
&lt;P&gt;Creating Scope Tags&lt;/P&gt;
&lt;P&gt;While still under Tenant Administration&amp;gt; Roles select Scope Tags Then Create.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Give it a name and description.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assign the proper groups then select create.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is all implemented properly, the admin will only be able to see items and devices that have the Scope tag that has been assigned to their role. Here are views of the apps in my tenant when signed in as a Intune Administrator (which Scope tags do not apply t&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And here are the same views when logged in with an admin with the iOS admin role that we created.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Establishing a RACI Model for Intune Management&lt;/H1&gt;
&lt;P&gt;While establishing a RACI model is not something done in the Intune portal, it is crucial in my opinion for enterprise customers since Intune covers such a vast number of capabilities that should not all be done by one team if we are practicing least privilege and zero trust.&lt;/P&gt;
&lt;P&gt;A RACI matrix is a powerful tool for defining organizational roles and responsibilities, identifying who is Responsible, Accountable, Consulted, and Informed for each activity. In Microsoft Intune management, implementing a RACI model eliminates ambiguity about which teams handle security policies, application management, patch compliance, Conditional Access, and GPO migration.&lt;/P&gt;
&lt;P&gt;The RACI framework defines four key roles: Responsible individuals execute the task or deliverable, Accountable is the single person ultimately answerable for correct completion and decision-making authority, Consulted are experts or stakeholders whose feedback is sought during the task, and Informed are those kept up to date on progress or decisions without actively contributing.&lt;/P&gt;
&lt;P&gt;For Intune environments, a well-designed RACI matrix promotes organizational alignment by mapping all key stakeholders across central IT and individual agencies or departments, clarifies decision rights by defining who approves, who executes, and who provides input for each Intune activity, ensures accountability by assigning a single accountable party for each deliverable to prevent diffusion of responsibility, and improves communication by identifying upfront who needs to be consulted and kept informed.&lt;/P&gt;
&lt;P&gt;Based on internal implementation experience and with Microsoft Federal customers, organizations should list deliverables not just activities, define roles not individual names to ensure the matrix remains relevant as people change positions, enforce exactly one Accountable person per task, assign Responsible, Consulted, and Informed roles thoughtfully, validate in a short review session, publish where work happens, and evolve the matrix as the project evolves.&lt;/P&gt;
&lt;H1&gt;RACI Matrix for Security Policies and Compliance&lt;/H1&gt;
&lt;P&gt;The following are just &lt;STRONG&gt;&lt;EM&gt;generic examples&lt;/EM&gt;&lt;/STRONG&gt; of some of the workloads and how they could be managed with a RACI matrix.&lt;/P&gt;
&lt;P&gt;Security policies and compliance management in Intune require clear ownership across multiple teams. Organizations must define who creates compliance policies requiring device encryption and minimum OS versions, who deploy security baselines like the Microsoft Defender for Endpoint Security Baseline, who manages Conditional Access policies that require device compliance, and who responds to non-compliant devices. A typical RACI model for security policies assigns the Cloud Security Team as Accountable for overall security policy strategy and compliance requirements, the Endpoint Team as Responsible for creating and deploying compliance policies and security baselines in Intune, the Application Team as Consulted for application-specific security requirements, the Help Desk as Informed about policy changes that may affect device compliance status, and the Compliance Team as Consulted to ensure policies meet regulatory requirements and as Informed about compliance status reports.&lt;/P&gt;
&lt;P&gt;For patch management and application compliance, the RACI model shifts slightly with the Endpoint Team becoming Accountable for patch deployment strategy and timing, the Application Team becoming Responsible for testing application compatibility with updates, the Help Desk becoming Responsible for addressing user-reported issues after patches, and the Cloud Security Team becoming Consulted for security update prioritization. Organizations implementing Windows Autopatch benefit from Microsoft managing problematic quality and feature update deployment cancellations using telemetry, automatically splitting devices into rings based on percentage of total devices, and managing patching behavior for Windows, Microsoft 365 Apps, Edge, Teams, and Drivers. This shifts some Accountable and Responsible designations to Microsoft while keeping internal teams Informed and Consulted.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Intune Activity&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Accountable&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Responsible&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Consulted&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Informed&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Security Policy Creation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud Security Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Endpoint Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Application Team, Compliance Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Help Desk&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Compliance Policy Deployment&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud Security Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Endpoint Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Compliance Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Help Desk, Application Team&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Security Baseline Management&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud Security Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Endpoint Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Application Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Help Desk, Compliance Team&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Patch Management Strategy&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Endpoint Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Application Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud Security Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Help Desk, Compliance Team&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Non-Compliance Response&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Cloud Security Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Endpoint Team, Help Desk&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Compliance Team&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Application Team&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;col style="width: 20.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H1&gt;Application and Conditional Access Management Responsibilities&lt;/H1&gt;
&lt;P&gt;Application management and Conditional Access in Intune span multiple organizational functions requiring coordinated responsibility. For application lifecycle management, the Application Team is both Accountable and Responsible for deployment strategy, app protection policies, creating and testing app packages and configurations. The Endpoint Team is Consulted for deployment targeting and device compatibility, while the Help Desk is Informed about new applications and support procedures.&lt;/P&gt;
&lt;P&gt;For Conditional Access policy management, multiple teams coordinate their expertise. The Cloud Security Team is Accountable for overall Conditional Access strategy and Zero Trust implementation. The Endpoint Team is Responsible for ensuring device compliance status feeds correctly into Conditional Access decisions. The Identity Team is Responsible for configuring Conditional Access policies in Microsoft Entra ID. The Application Team is Consulted about application-specific access requirements, and the Help Desk is both Informed about access restrictions and Responsible for assisting users blocked by Conditional Access policies.&lt;/P&gt;
&lt;P&gt;Conditional Access integration with Intune creates a powerful Zero Trust security model where Intune evaluates device compliance based on compliance policies, compliance status is reported to Microsoft Entra ID, Conditional Access policies check device compliance status, and access is granted or blocked based on compliance status.&lt;/P&gt;
&lt;P&gt;For mobile application management, the Application Team is both Accountable and Responsible for app protection policies including data protection settings, access requirements like PIN and biometric authentication, and integration with Conditional Access. The Cloud Security Team is Consulted for security requirements, and the Endpoint Team is Informed about app-level controls that complement device-level policies.&lt;/P&gt;
&lt;H1&gt;GPO Migration to Intune: Roles and Responsibilities&lt;/H1&gt;
&lt;P&gt;Migrating Group Policy Objects from on-premises Active Directory to Microsoft Intune represents a critical transformation requiring clear ownership and phased execution. The migration process uses Group Policy Analytics, a built-in tool in Intune that analyzes on-premises GPOs by importing them as XML exports and translating them against the Settings Catalog to determine which policies are supported, deprecated, or unsupported in Intune.&lt;/P&gt;
&lt;P&gt;Organizations export GPOs from the Group Policy Management Console by right clicking the GPO, selecting Save Report, and saving as XML format. After importing to Intune via Devices &amp;gt; Group Policy Analytics, the tool generates a percentage-based report showing exactly how many settings have a direct 1:1 mapping to modern Intune settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Group Policy Analytics tool categorizes settings into three distinct types: Supported settings that have a direct counterpart in Intune and can be migrated via Settings Catalog policies, Deprecated settings no longer applicable to modern Windows versions, and Not Supported settings that do not currently have a CSP mapping and often require alternative management methods like PowerShell scripts or Proactive Remediations. Approximately 45% of GPOs can be successfully migrated to Settings Catalog, 30% require alternative approaches via PowerShell remediations, and 25% can be deprecated and retired based on typical migration outcomes.&lt;/P&gt;
&lt;H2&gt;RACI Model for GPO Migration&lt;/H2&gt;
&lt;P&gt;For the RACI model, the Endpoint Team is Accountable for the overall GPO migration strategy and timeline, the Active Directory Team is Responsible for exporting GPOs and documenting current policy structures, the Application Team is Consulted to validate that application-specific GPOs migrate correctly and that applications continue functioning, the Cloud Security Team is Consulted to ensure migrated policies maintain security posture, and the Help Desk is Informed about changes to device configurations and becomes Responsible for user communication about policy transitions.&lt;/P&gt;
&lt;H1&gt;Integrating Conditional Access with Device Compliance&lt;/H1&gt;
&lt;P&gt;Conditional Access integration with Intune device compliance creates an additional layer of security by enforcing access controls based on device compliance status and app protection policies. This integration ensures that only compliant devices and protected apps can access organizational resources, forming a cornerstone of Zero Trust architecture.&lt;/P&gt;
&lt;H2&gt;Device-Based Conditional Access Implementation&lt;/H2&gt;
&lt;P&gt;Device-based Conditional Access uses device compliance status from Intune to control access to organizational resources through a four-step process:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Intune evaluates device compliance based on compliance policies&lt;/LI&gt;
&lt;LI&gt;Compliance status is reported to Microsoft Entra ID&lt;/LI&gt;
&lt;LI&gt;Conditional Access policies check device compliance status&lt;/LI&gt;
&lt;LI&gt;Access is granted or blocked based on compliance status&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;To implement device compliance Conditional Access, organizations first create and assign device compliance policies in Intune requiring elements like BitLocker encryption, Microsoft Defender antivirus enabled, Windows Firewall enabled, and minimum OS version requirements. Then in the Microsoft Entra Admin Center under Security &amp;gt; Conditional Access, administrators create policies specifying:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Users&lt;/STRONG&gt; as target groups like Corporate Users&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud apps&lt;/STRONG&gt; as All cloud apps or selected Microsoft 365 apps&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Device platform&lt;/STRONG&gt; as Windows or other platforms&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Access control&lt;/STRONG&gt; requiring device to be marked as compliant&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Measuring Success and Continuous Improvement&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Organizations implementing Intune RBAC and Scope Tags should establish metrics to measure success and identify areas for continuous improvement. Key performance indicators include percentage of devices compliant with security policies, time to resolve non-compliance issues, number of unauthorized access attempts blocked by Conditional Access, percentage of GPOs successfully migrated to Intune Settings Catalog, and administrative efficiency measured by reduction in time spent on routine management tasks.&lt;/P&gt;
&lt;P&gt;Compliance reporting in Intune provides visibility into device compliance status across the organization, with reports showing compliant versus non-compliant devices, specific compliance policy violations, and trends over time. Organizations typically see compliance rates improve from a 65% baseline to 95% or higher within 12 months of implementing proper RBAC roles and Scope Tags. This improvement results from clearer ownership, faster policy deployment, and more focused administrative oversight.&lt;/P&gt;
&lt;P&gt;Conditional Access sign-in logs in Microsoft Entra ID reveal which access attempts are granted or blocked, the reasons for access decisions, and patterns of risky sign-ins that may indicate compromised credentials or devices. For RBAC effectiveness, organizations should monitor audit logs to track which administrators are performing which actions, identify any privilege escalation attempts or suspicious administrative activity, and ensure separation of duties is maintained.&lt;/P&gt;
&lt;P&gt;Scope tag effectiveness can be measured by confirming that administrators only see resources within their designated scope, tracking incidents where admins requested access outside their scope, and validating that regional or departmental segregation is working as intended. Organizations should establish a regular review cadence with monthly compliance and security posture reviews, quarterly RBAC and Scope Tag access reviews, bi-annual GPO migration progress assessments, and annual Zero Trust maturity assessments.&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Disclaimer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;All screenshots are from a non-production lab environment and can/will vary per environment. All processes and directions are of my own opinion and not of Microsoft and are from my years of experience with the Intune product in multiple customer environments&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;References&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/role-based-access-control" target="_blank" rel="noopener"&gt;Role-based access control (RBAC) with Microsoft Intune - Microsoft Intune | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/scope-tags" target="_blank" rel="noopener"&gt;Use role-based access control (RBAC) and scope tags for distributed IT - Microsoft Intune | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/organize/raci-alignment" target="_blank" rel="noopener"&gt;Aligning responsibilities across teams - Cloud Adoption Framework | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-all-users-device-compliance" target="_blank" rel="noopener"&gt;How to Require Device Compliance with Conditional Access - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/configuring-microsoft-intune-just-in-time-admin-access-with-azure-ad-pim-for-gro/3843972" target="_blank" rel="noopener"&gt;Configuring Microsoft Intune just-in-time admin access with Azure AD PIM for Groups | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 12:48:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/implementing-intune-rbac-and-scope-tags-for-zero-trust-and-least/ba-p/4506889</guid>
      <dc:creator>ChrisVetter</dc:creator>
      <dc:date>2026-03-30T12:48:45Z</dc:date>
    </item>
    <item>
      <title>What Changed in RC4 with the January 2026 Windows Update and Why it is Important</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/what-changed-in-rc4-with-the-january-2026-windows-update-and-why/ba-p/4504732</link>
      <description>&lt;P&gt;In case you haven’t heard, RC4 is not secure and has been deprecated. In this article, I will discuss what changed with the January 2026 Windows Update and why it is important to start auditing and remediate RC4 usage is your environment.&lt;/P&gt;
&lt;P&gt;Starting with the&amp;nbsp;&lt;STRONG&gt;January 13, 2026, Windows security updates&lt;/STRONG&gt;, Microsoft began the first official phase of&amp;nbsp;&lt;STRONG&gt;hardening Kerberos authentication by reducing reliance on RC4 encryption&lt;/STRONG&gt;. The RC4 change will mainly impact service accounts and accounts that have the attribute&amp;nbsp;msDS-SupportedEncryptionTypes&amp;nbsp;left blank.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Why Microsoft Is Targeting RC4&lt;/H1&gt;
&lt;P&gt;&lt;STRONG&gt;RC4&amp;nbsp;&lt;/STRONG&gt;is considered insecure due to&amp;nbsp;cryptographic flaws that produce biased, non-random output, allowing attackers to recover encrypted data.&lt;/P&gt;
&lt;P&gt;Despite this, RC4 remains enabled by default in many Active Directory environments for backward compatibility.&lt;/P&gt;
&lt;P&gt;Microsoft tied the January changes to a Kerberos information disclosure vulnerability tracked as&amp;nbsp;&lt;STRONG&gt;CVE-2026-20833&lt;/STRONG&gt;, using this security update as the entry point to begin the RC4 deprecation process.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Update Timeline: From Audit to Full Enforcement&lt;/H1&gt;
&lt;P&gt;Microsoft is rolling out the Kerberos RC4 hardening in&amp;nbsp;&lt;STRONG&gt;well-defined phases throughout 2026&lt;/STRONG&gt;, giving organizations time to identify dependencies and remediate them before enforcement becomes mandatory. Understanding this timeline is critical to avoid outages.&lt;/P&gt;
&lt;H2&gt;Phase 1 – Initial Deployment (January 2026)&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Starting on January 13, 2026&lt;/STRONG&gt;, Windows security updates introduce the&amp;nbsp;&lt;STRONG&gt;initial deployment phase&lt;/STRONG&gt;.&lt;BR /&gt;This stage is focused on monitoring, &lt;U&gt;not enforcement&lt;/U&gt;.&lt;/P&gt;
&lt;P&gt;Key points of this phase:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;New Kerberos audit events&lt;/STRONG&gt;&amp;nbsp;are logged on Domain Controllers (we will analyze them later in this article)&lt;/LI&gt;
&lt;LI&gt;A&amp;nbsp;&lt;STRONG&gt;temporary registry control&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;setting&lt;/STRONG&gt; (RC4DefaultDisablementPhase) has been introduced, allowing organizations to optionally enable stricter behavior ahead of time&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No default behavior changes&lt;/STRONG&gt;&amp;nbsp;are applied&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Phase 2 – Enforcement Enabled by Default (April 2026)&lt;/H2&gt;
&lt;P&gt;Beginning with the&amp;nbsp;&lt;STRONG&gt;April 2026 Windows security update&lt;/STRONG&gt;, Microsoft moves to the &lt;STRONG&gt;second deployment phase&lt;/STRONG&gt;, where behavior changes start to matter operationally.&lt;/P&gt;
&lt;P&gt;During this phase:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enforcement mode is enabled by default&lt;/STRONG&gt;&amp;nbsp;on all supported Windows Domain Controllers, the default value for&amp;nbsp;&lt;STRONG&gt;DefaultDomainSupportedEncTypes&lt;/STRONG&gt;&amp;nbsp;is set to allow AES-SHA1 only:&lt;STRONG&gt;&amp;nbsp;0x18&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;This changes the Kerberos KDC default behavior for accounts&amp;nbsp;&lt;STRONG&gt;without an explicit&amp;nbsp;&lt;/STRONG&gt;msDS-SupportedEncryptionTypes&lt;STRONG&gt;&amp;nbsp;configuration&lt;/STRONG&gt;&amp;nbsp;to allow RC4. RC4 is no longer negotiated implicitly for accounts with a blank msDS-SupportedEncryptionTypes, they will only receive&amp;nbsp;&lt;STRONG&gt;AES encrypted tickets&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;While it is still technically possible to revert to audit behavior temporarily (by changing the value of the registry key mentioned above), it will be important to arrive in this phase with the&amp;nbsp;&lt;STRONG&gt;remediation already completed&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;Phase 3 – Full Enforcement (July 2026)&lt;/H2&gt;
&lt;P&gt;The final phase begins with the&amp;nbsp;&lt;STRONG&gt;July 2026 security updates&lt;/STRONG&gt;&amp;nbsp;and represents the&amp;nbsp;&lt;STRONG&gt;end of the transition period&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;At this point:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Audit‑only mode is removed&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;The temporary&amp;nbsp;&lt;STRONG&gt;RC4DefaultDisablementPhase&lt;/STRONG&gt;&amp;nbsp;registry value is no longer read&lt;/LI&gt;
&lt;LI&gt;the default value for &lt;STRONG&gt;DefaultDomainSupportedEncTypes&lt;/STRONG&gt; is set to &lt;STRONG&gt;AES-SHA1 only&lt;/STRONG&gt; (0x18)&lt;/LI&gt;
&lt;LI&gt;With this configuration, Kerberos will issue RC4 tickets&amp;nbsp;&lt;STRONG&gt;only if explicitly configured per account &lt;/STRONG&gt;using the attribute “msDS-SupportedEncryptionTypes&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;”&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Organizations that didn’t address RC4 usage earlier will experience persistent service outages for legacy systems and applications not compatible with AES encryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;How to prepare for the changes&lt;/H1&gt;
&lt;P&gt;It’s tempting to ignore the January changes because “nothing is broken,” but that would be a mistake. The new audit events are here to help you prepare for the changes.&lt;/P&gt;
&lt;P&gt;Let’s analyze how we can leverage audit data to be&amp;nbsp;&lt;STRONG&gt;ready before April 2026&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;Audit events&lt;/H2&gt;
&lt;P&gt;After the January Windows security update, some new events will start to appear in the &lt;EM&gt;system event logs&lt;/EM&gt; of supported domain controllers if:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Your&amp;nbsp;domain controller is&amp;nbsp;receiving Kerberos service ticket requests&amp;nbsp;that&amp;nbsp;&lt;STRONG&gt;require RC4&amp;nbsp;&lt;/STRONG&gt;cipher to be used but the&amp;nbsp;service account has default encryption configuration&lt;/LI&gt;
&lt;LI&gt;Your domain controller has an explicit&amp;nbsp;&lt;STRONG&gt;DefaultDomainSupportedEncTypes&lt;/STRONG&gt;&amp;nbsp;configuration to allow RC4 encryption&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To understand if your environment will be impacted by the change, you’ll need to&amp;nbsp;&lt;STRONG&gt;audit the events&lt;/STRONG&gt;&amp;nbsp;201,202,205,206,207 from the system event log. The events 203,204,208 and 209 will be logged starting from phase 2. See&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/topic/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc" target="_blank"&gt;this&amp;nbsp;&lt;/A&gt;Microsoft article for more details about the events.&lt;/P&gt;
&lt;P&gt;These events are designed to help you identify accounts or services still requesting RC4encrypted tickets and clients or applications that do not support AES. This gives administrators a&amp;nbsp;&lt;STRONG&gt;safe discovery phase&lt;/STRONG&gt;&amp;nbsp;to identify dependencies before anything stops working.&lt;/P&gt;
&lt;H2&gt;Identify High Risk Dependencies&lt;/H2&gt;
&lt;P&gt;Not all RC4 usage has the same impact. The audit events allow administrators to prioritize remediation by identifying:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Service accounts&lt;/STRONG&gt;&amp;nbsp;that rely on RC4 due to missing or outdated encryption keys, such as accounts that have not had password reset in years&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Legacy applications or appliances&lt;/STRONG&gt;&amp;nbsp;that cannot negotiate AES&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Service accounts deserve special attention because they are commonly affected by RC4 dependencies and are high value targets in Kerberoasting scenarios.&lt;/P&gt;
&lt;H2&gt;Validate Kerberos Encryption Configuration&lt;/H2&gt;
&lt;P&gt;One of the most important insights provided by the new events is whether accounts are missing&amp;nbsp;&lt;STRONG&gt;AES‑compatible Kerberos keys&lt;/STRONG&gt;&amp;nbsp;(msDS-SupportedEncryptionTypes).&lt;/P&gt;
&lt;P&gt;In many cases, RC4 usage is not intentional but happens because the account password has never been reset since AES support was introduced or because the encryption types are implicitly inherited rather than explicitly defined.&lt;/P&gt;
&lt;P&gt;The audit data allows you to confirm which accounts already support AES and which ones will fail once AESonly behavior becomes the default.&lt;/P&gt;
&lt;H2&gt;Establish a Remediation Baseline Before April&lt;/H2&gt;
&lt;P&gt;By the time the&amp;nbsp;&lt;STRONG&gt;April 2026 enforcement phase&lt;/STRONG&gt;&amp;nbsp;begins, you should already have:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Reviewed Kerberos audit events across all domain controllers&lt;/LI&gt;
&lt;LI&gt;Identified all RC4-dependent accounts and services&lt;/LI&gt;
&lt;LI&gt;Confirmed AES compatibility where possible&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Documented any unavoidable legacy dependencies&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The January audit data is meant to drive these actions early, while remediation can still be planned and tested calmly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Why the January Update Matters (Even If Nothing Breaks Yet)&lt;/H1&gt;
&lt;P&gt;Since the creation of AES-SHA1 tickets has been implemented in Windows Server 2008R2, I’m confident that many organizations won’t have issues with this transition and can use these phases to validate their configurations.&lt;/P&gt;
&lt;P&gt;If you didn’t have the chance or the time to address the RC4 usage earlier, don’t give into the temptation to ignore the January changes, because that would be unwise. The audit events that have been introduced are&amp;nbsp;&lt;STRONG&gt;your only early warning system&lt;/STRONG&gt;&amp;nbsp;to avoid Kerberos authentication failures, problems with legacy applications, and service accounts failing due to missing AES keys.&lt;/P&gt;
&lt;P&gt;In practice, the January update is the&amp;nbsp;&lt;STRONG&gt;last safe window&lt;/STRONG&gt;&amp;nbsp;to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify RC4‑only service accounts&lt;/LI&gt;
&lt;LI&gt;Detect non-AES-capable clients&lt;/LI&gt;
&lt;LI&gt;Fix misconfigured Kerberos encryption settings on your terms&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Organizations that use this phase to&amp;nbsp;&lt;STRONG&gt;audit, remediate, and modernize&lt;/STRONG&gt;&amp;nbsp;will transition smoothly.&lt;BR /&gt;Those who ignore it risk discovering RC4 dependencies&amp;nbsp;&lt;STRONG&gt;only when enforcement is already active&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 14:08:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/what-changed-in-rc4-with-the-january-2026-windows-update-and-why/ba-p/4504732</guid>
      <dc:creator>Elanor92</dc:creator>
      <dc:date>2026-03-23T14:08:21Z</dc:date>
    </item>
    <item>
      <title>Remove Unnecessary Azure Storage Account Dependencies in VM Diagnostics</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/remove-unnecessary-azure-storage-account-dependencies-in-vm/ba-p/4501380</link>
      <description>&lt;P&gt;In a recent engagement with a customer willing to decrease Shared Access Signature (SAS) tokens usage in their Storage Accounts, we found out that a good amount of SAS token-based requests was associated with VM diagnostics. One practical way to reduce SAS token usage is to eliminate dependencies that require Storage Accounts in the first place, especially when Azure offers managed alternatives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This post focuses on two VM-level features that often introduce (or preserve) unnecessary Storage Account coupling:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The legacy &lt;STRONG&gt;IaaS Diagnostics&lt;/STRONG&gt; extension (retiring), which can write diagnostic data to Storage&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Boot diagnostics&lt;/STRONG&gt; configured to use a customer-managed Storage Account, considering Microsoft-managed boot diagnostics works as well without any operational effort.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;1) Retire the legacy IaaS Diagnostics extension&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you’re no longer using the legacy&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/agents/diagnostics-extension-overview" target="_blank"&gt;IaaS Diagnostics&lt;/A&gt; extension for VM monitoring and troubleshooting, removing it is an easy win: it reduces Storage Account coupling and helps you stay ahead of platform deprecations. Microsoft has announced retirement of the extension as of &lt;U&gt;March 31&lt;/U&gt;, so now is a good time to inventory and remove it where it’s still present.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to find affected VMs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use Azure Resource Graph (ARG) to identify virtual machines with the extension installed across subscriptions at scale. Once you have the list, you can remove the extension directly from the Azure portal or using your preferred automation approach (PowerShell or Azure CLI).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For a proven at-scale removal pattern (including cleanup of the data the extension produced), see &lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/how-to-remove-at-scale-the-azure-diagnostics-extension-and-its-storage-data/2091507" target="_blank"&gt;How to remove at scale the Azure Diagnostics Extension and its storage data&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;2) Switch boot diagnostics to Microsoft-managed storage&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Boot diagnostics are invaluable when you need VM boot screenshots/logs and serial console access. Historically, it required a customer-managed Storage Account—often leading teams to create “diagnostics” Storage Accounts, wire up access, and sometimes rely on SAS tokens to make the integration work across tooling.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today, you can enable boot diagnostics without providing a Storage Account by using &lt;A href="https://learn.microsoft.com/azure/virtual-machines/boot-diagnostics#enable-managed-boot-diagnostics" target="_blank"&gt;managed boot diagnostics&lt;/A&gt; (Microsoft-managed storage). In most scenarios, this removes an entire class of dependency without sacrificing functionality. The switch is also operationally friendly: it does not require a VM reboot and doesn’t interfere with the guest OS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to find and migrate at scale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;As with extensions, Azure Resource Graph is a good starting point to identify VMs that have boot diagnostics enabled against a customer-managed Storage Account. Use the query below to identify those VMs:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="sql"&gt;resources
| where type =~ 'microsoft.compute/virtualmachines'
| extend diagProfile = properties.diagnosticsProfile.bootDiagnostics
| extend powerState = tostring(properties.extended.instanceView.powerState.code)
| extend diagAccount = tostring(split(parse_url(tostring(properties.diagnosticsProfile.bootDiagnostics.storageUri)).Host,'.')[0])
| extend bootDiagnosticsEnabled = tobool(properties.diagnosticsProfile.bootDiagnostics.enabled)
| project name, resourceGroup, subscriptionId, powerState, bootDiagnosticsEnabled, diagAccount
| where bootDiagnosticsEnabled and isnotempty(diagAccount)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After you’ve validated the impact in a non-production subscription, you can automate migration in bulk to enable managed boot diagnostics, by using &lt;A href="https://github.com/helderpinto/azure-wellarchitected-toolkit/blob/main/operational-excellence/scripts/Set-AzVMBootDiagnosticsWrapper.ps1" target="_blank"&gt;the Set-AzVMBootDiagnosticsWrapper.ps1&lt;/A&gt; script. Simply download it, unblock it (file properties &amp;gt; unblock), and upload it to Azure Cloud Shell.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example PowerShell usage pattern:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;./Set-AzVMBootDiagnosticsWrapper.ps1 -Action EnableManaged [-TargetSubscriptionId &amp;lt;sub id&amp;gt;] [-ARGFilter &amp;lt;ARG condition, e.g., resourceGroup =~ 'xyz'&amp;gt;] [-Simulate]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Wrap-up&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reducing SAS token usage isn’t only about replacing tokens with another credential type —it’s also about removing the underlying dependencies that make tokens attractive in the first place. By (1) removing the retiring IaaS Diagnostics extension and (2) migrating boot diagnostics to Microsoft-managed storage, you can simplify your VM baseline, reduce Storage Account sprawl, and stay ahead of deprecations. As a next step, consider standardizing these checks in your provisioning pipelines (Bicep/Terraform), and add periodic ARG-based hygiene queries to keep drift under control.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/remove-unnecessary-azure-storage-account-dependencies-in-vm/ba-p/4501380</guid>
      <dc:creator>hspinto</dc:creator>
      <dc:date>2026-03-16T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Bulk enable Azure Arc Connected Machine Agent Automatic Upgrade (Tag Scoped) with Azure Cloud Shell</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/bulk-enable-azure-arc-connected-machine-agent-automatic-upgrade/ba-p/4501749</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Overview&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Keeping the &lt;STRONG&gt;Azure Arc Connected Machine agent&lt;/STRONG&gt; current is a foundational hygiene task for any hybrid server estate, especially when you’re operating at scale and onboarding hundreds (or thousands) of machines into Arc.&lt;/P&gt;
&lt;P&gt;The good news: Azure Arc supports an &lt;STRONG&gt;automatic agent upgrade (preview)&lt;/STRONG&gt; capability that can be enabled per Arc machine by setting the &lt;EM&gt;agentUpgrade.enableAutomaticUpgrade&lt;/EM&gt; property via Azure Resource Manager (ARM). Microsoft’s public guidance shows enabling this using a &lt;STRONG&gt;PATCH&lt;/STRONG&gt; call (via Invoke-AzRestMethod) against the Arc machine resource with the 2024-05-20-preview API version. &lt;A href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/manage-agent?tabs=windows#automatic-agent-upgrade-preview" target="_blank"&gt;Manage and maintain the Azure Connected Machine agent - Azure Arc | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In real environments, you rarely want to enable this across &lt;EM&gt;every&lt;/EM&gt; Arc-enabled server in one shot. Instead, you typically:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;start with a &lt;STRONG&gt;pilot ring&lt;/STRONG&gt; (e.g., Dev/Test or low‑risk servers),&lt;/LI&gt;
&lt;LI&gt;validate results, and then&lt;/LI&gt;
&lt;LI&gt;expand coverage gradually.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;The Script:&lt;/STRONG&gt; &lt;A href="https://github.com/Abhishek-Sharan/ExtensionManagement/blob/main/AzArc-EnableAutoUpgrade.ps1" target="_blank"&gt;Abhishek-Sharan/ExtensionManagement: Install &amp;amp; Manage Extensions&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The script implements exactly that approach by:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;prompting an &lt;STRONG&gt;explicit disclaimer acknowledgement&lt;/STRONG&gt; (safety gate),&lt;/LI&gt;
&lt;LI&gt;selecting Arc machines &lt;STRONG&gt;by tag&lt;/STRONG&gt; (a controlled blast-radius technique),&lt;/LI&gt;
&lt;LI&gt;enabling automatic upgrade using &lt;STRONG&gt;ARM PATCH&lt;/STRONG&gt; through Invoke-AzRestMethod,&lt;/LI&gt;
&lt;LI&gt;producing a &lt;STRONG&gt;final summary report&lt;/STRONG&gt; of success/failure per machine.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This post walks through what the script does, why each section exists, and what to consider before using it in production.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why Tag‑Scoped Enablement?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In many enterprise deployments, tags are the simplest way to define a “ring” of servers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Ring=Pilot&lt;/LI&gt;
&lt;LI&gt;Environment=NonProd&lt;/LI&gt;
&lt;LI&gt;Workload=LowRisk&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This script discovers resources of type &lt;STRONG&gt;&lt;EM&gt;Microsoft.HybridCompute&lt;/EM&gt;&lt;/STRONG&gt; machines in a given resource group and filters them by a tag/value pair. That makes it easy to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;onboard machines first,&lt;/LI&gt;
&lt;LI&gt;apply tags as part of provisioning,&lt;/LI&gt;
&lt;LI&gt;then flip on agent auto-upgrade only for the right cohort.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Script Details (Walkthrough)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1) Safety Gate: Disclaimer + Explicit User Consent&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This script prints a disclaimer block and requires the operator to type &lt;STRONG&gt;Y&lt;/STRONG&gt; to proceed. If the user types anything else, the script exits.&lt;/P&gt;
&lt;P&gt;Why it matters:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;It prevents accidental execution (especially in shared shells or jump boxes).&lt;/LI&gt;
&lt;LI&gt;It reinforces that this is a &lt;STRONG&gt;potentially impactful&lt;/STRONG&gt; change across multiple machines.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Configuration: Subscription, Resource Group, and Tag Scope&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The script sets the active Azure context:&lt;/P&gt;
&lt;P&gt;Set-AzContext -Subscription "YOUR SUBSCRIPTION"&lt;/P&gt;
&lt;P&gt;Then defines:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;$resourceGroup&lt;/LI&gt;
&lt;LI&gt;$tagName, $tagValue&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3) Discovery: Find Azure Arc Machines with a Target Tag&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Discovery uses:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Get-AzResource -ResourceType "Microsoft.HybridCompute/machines"&lt;/LI&gt;
&lt;LI&gt;filters by tag match on the returned resource object.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This ensures you are only targeting Arc-enabled servers represented as &lt;STRONG&gt;&lt;EM&gt;Microsoft.HybridCompute&lt;/EM&gt;&lt;/STRONG&gt; machines resources.&lt;/P&gt;
&lt;P&gt;If no machines are found, the script exits cleanly, which avoids the “silent no-op” problem and helps operators quickly validate that scope selection is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4) Update: Enable Automatic Upgrade via ARM PATCH&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For each machine, the script uses Invoke-AzRestMethod with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ResourceProviderName = "Microsoft.HybridCompute"&lt;/LI&gt;
&lt;LI&gt;ResourceType = "Machines"&lt;/LI&gt;
&lt;LI&gt;ApiVersion = "2024-05-20-preview"&lt;/LI&gt;
&lt;LI&gt;Method = "PATCH"&lt;/LI&gt;
&lt;LI&gt;payload:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;{"properties":{"agentUpgrade":{"enableAutomaticUpgrade":true}}}&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5) Output: Per‑Machine Result + Final Summary Table&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The script records results into an array of PSCustomObject entries with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;MachineName&lt;/LI&gt;
&lt;LI&gt;EnableAutomaticUpgrade&lt;/LI&gt;
&lt;LI&gt;Result (Success/Failed)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then prints a formatted table.&lt;/P&gt;
&lt;P&gt;This is useful for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;quick operator confirmation,&lt;/LI&gt;
&lt;LI&gt;change records,&lt;/LI&gt;
&lt;LI&gt;attaching output to internal work items / change tickets.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This script is a solid operational accelerant for teams managing Arc-enabled servers at scale. It combines:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;safety&lt;/STRONG&gt; (explicit disclaimer + opt-in),&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;control&lt;/STRONG&gt; (tag-based targeting),&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;automation&lt;/STRONG&gt; (bulk enabling via ARM PATCH),&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;observability&lt;/STRONG&gt; (clear per-server results and a final summary).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you’re trying to standardize operational hygiene across hundreds of Arc machines, tag-scoped enablement like this is one of the cleanest ways to start small, learn safely, and then scale.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2026 20:38:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/bulk-enable-azure-arc-connected-machine-agent-automatic-upgrade/ba-p/4501749</guid>
      <dc:creator>absharan</dc:creator>
      <dc:date>2026-03-12T20:38:28Z</dc:date>
    </item>
    <item>
      <title>Check This Out! (CTO!) Guide (February 2026)</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-february-2026/ba-p/4501272</link>
      <description>&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/users/tysonpaul/322025" data-lia-auto-title="Member: TysonPaul | Microsoft Community Hub" data-lia-auto-title-active="0" target="_blank"&gt;Member: TysonPaul | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/secure-dns-with-doh-public-preview-for-windows-dns-server/4493935" target="_blank" rel="noopener noreferrer"&gt;Secure DNS with DoH: Public Preview for Windows DNS Server&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/networkingblog" target="_blank" rel="noopener noreferrer"&gt;Networking&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jorgeca%C3%B1as/2838432" target="_blank" rel="noopener noreferrer"&gt;JorgeCañas&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/09/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has launched a public preview of DNS over HTTPS (DoH) for Windows DNS Server, available in the February 2026 update for Windows Server 2025. DoH encrypts DNS queries and responses, enhancing authentication and privacy while maintaining existing server functions. This move aligns with Zero Trust security principles and supports U.S. federal cybersecurity requirements. The feature is disabled by default, is not production-ready, and currently only encrypts client-to-server traffic. Feedback is encouraged during the preview phase, with future updates planned for upstream encryption support.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/azure-blob-tiering-clarity-truths-and-practical-guidance-for-architects/4493156" target="_blank" rel="noopener noreferrer"&gt;Azure Blob Tiering: Clarity, Truths, and Practical Guidance for Architects&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azureinfrastructureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Infrastructure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/nehatiwari1994/2009532" target="_blank" rel="noopener noreferrer"&gt;nehatiwari1994&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/06/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article explains Azure Blob Storage tiering for backup architects, debunking common misconceptions about tier performance and access. Hot, Cool, and Cold tiers are online and offer immediate data access; minimum retention is a billing rule, not a technical limit. Archive tier requires rehydration before restores. Restore speed depends on throughput architecture, not tier. Cost is influenced by both storage and access patterns. Effective tiering strategies and lifecycle policies are essential for scaling backup repositories from terabytes to petabytes, ensuring operational safety and cost control. The article offers practical design recommendations and clarifies Azure tier behaviors.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/aks-tenant-migration-considerations-and-approach/4415198" target="_blank" rel="noopener noreferrer"&gt;AKS Tenant Migration: Considerations and Approach&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azureinfrastructureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Infrastructure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/soumyashet05/3024853" target="_blank" rel="noopener noreferrer"&gt;SoumyaShet05&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/05/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; 321: No summary could be found for article: [AKS Tenant Migration: Considerations and Approach] [https://techcommunity.microsoft.com/blog/azureinfrastructureblog/aks-tenant-migration-considerations-and-approach/4415198].&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/finopsblog/what%E2%80%99s-new-in-finops-toolkit-13-%E2%80%93-january-2026/4493090" target="_blank" rel="noopener noreferrer"&gt;What’s new in FinOps toolkit 13 – January 2026&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/finopsblog" target="_blank" rel="noopener noreferrer"&gt;FinOps&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/michael_flanakin/3099145" target="_blank" rel="noopener noreferrer"&gt;Michael_Flanakin&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/09/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; FinOps toolkit 13 (January 2026) delivers stability and usability improvements for cloud cost management, including enhanced documentation, Key Vault purge protection options, Power BI report fixes, and streamlined Cost Management exports via PowerShell with Parquet support. The release strengthens security, reliability, and extensibility for enterprise-scale deployments. Community engagement is emphasized with new office hours. Future plans include AI-driven automation, expanded recommendations, and premium support services. The toolkit remains open-source and continues to evolve with community contributions and ongoing enhancements across Microsoft Cloud environments.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/askds/reading-gpsvc-like-a-crime-novel/4497135" target="_blank" rel="noopener noreferrer"&gt;Reading GPSVC Like a Crime Novel&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/askds" target="_blank" rel="noopener noreferrer"&gt;Ask the Directory Services Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/chris_cartwright/721086" target="_blank" rel="noopener noreferrer"&gt;Chris_Cartwright&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/25/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article, "Reading GPSVC Like a Crime Novel," explains how to troubleshoot Group Policy issues using the enhanced GPSVC debug log in modern Windows 11 versions. It details the two core phases of Group Policy processing, emphasizes the importance of following log threads, and highlights the benefit of new date and time stamps for better correlation with other events. The post also covers enabling verbose logging, interpreting log entries, and using additional tools like TSS for deeper analysis, ultimately making GPSVC logs more powerful for diagnosing Group Policy problems.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/askds/what%E2%80%99s-new-in-windows-group-policy-preferences-debug-logging/4497060" target="_blank" rel="noopener noreferrer"&gt;What’s New in Windows Group Policy Preferences Debug Logging&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/askds" target="_blank" rel="noopener noreferrer"&gt;Ask the Directory Services Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/tagoren/1668477" target="_blank" rel="noopener noreferrer"&gt;TagoreN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/27/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article outlines enhancements to Windows Group Policy Preferences (GPP) debug logging in Windows 11 versions 24H2 and 25H2 (from February 2026 preview updates). Administrators can now enable verbose GPP debug logging directly via Local Group Policy, not just domain-based GPOs. This change simplifies troubleshooting, reduces reliance on domain controllers, and allows easier, flexible diagnostic workflows on client devices. The article explains how to configure logging settings, log locations, and necessary permissions, highlighting a significant quality-of-life improvement for IT professionals managing GPP issues.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuremigrationblog/azure-landing-zone-and-compliance-for-banks-indian-banks/4491951" target="_blank" rel="noopener noreferrer"&gt;Azure Landing Zone and compliance for Banks (Indian Banks)&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuremigrationblog" target="_blank" rel="noopener noreferrer"&gt;Azure Migration and Modernization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/srhulsus/2739562" target="_blank" rel="noopener noreferrer"&gt;srhulsus&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/12/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; **Summary:** Azure Landing Zone (ALZ) provides Indian banks with a secure, compliant, and auditable cloud foundation, aligning with RBI and global standards (ISO 27001, PCI-DSS, FFIEC). It features subscription isolation, centralized IAM, robust network and data security, mandatory encryption, continuous monitoring, and business continuity controls. ALZ ensures India data residency, policy automation, regulatory audit support, and secure exit management. The architecture is regulator-accepted and proven by major banks, supporting governance, risk, and compliance mandates for hosting sensitive, regulated banking workloads on Azure.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuremigrationblog/migrating-workloads-from-aws-to-azure-a-structured-approach-for-cloud-architects/4495227" target="_blank" rel="noopener noreferrer"&gt;Migrating Workloads from AWS to Azure: A Structured Approach for Cloud Architects&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuremigrationblog" target="_blank" rel="noopener noreferrer"&gt;Azure Migration and Modernization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/rhack/2854208" target="_blank" rel="noopener noreferrer"&gt;rhack&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article outlines a structured, five-phase approach for migrating workloads from AWS to Azure, emphasizing a “like-for-like” architecture to minimize risk and complexity. Key phases include planning, preparation, execution, evaluation, and decommissioning, with blue/green deployment recommended for risk reduction. Success hinges on comprehensive documentation, stakeholder alignment, phased validation, and having the current workload team lead the migration. External partners can assist with planning but should not execute cutovers. Once stability on Azure is achieved, optimization can begin. Thorough preparation and collaboration are essential for a confident, disruption-free migration.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/how-to-enable-https-support-for-microsoft-connected-cache-for-enterprise-and-edu/4496173" target="_blank" rel="noopener noreferrer"&gt;How to enable HTTPS support for Microsoft Connected Cache for Enterprise and Education&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftintune/blog/intunecustomersuccess" target="_blank" rel="noopener noreferrer"&gt;Intune Customer Success&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/intune_support_team/226779" target="_blank" rel="noopener noreferrer"&gt;Intune_Support_Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/20/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Starting June 16, 2026, Intune will require HTTPS for Microsoft Connected Cache nodes serving Win32 apps. To retain bandwidth savings and localize content, admins must configure HTTPS on their Connected Cache servers by preparing a TLS certificate, generating a CSR on the node, signing it with a CA, importing the certificate, and validating HTTPS. The process is similar for Windows and Linux hosts. Regular certificate monitoring and renewal are necessary. Without HTTPS, devices will fall back to CDN. Improvements and fixes are underway, and early setup ensures readiness for the upcoming enforcement.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-resolve-device-noncompliance-with-mobile-threat-defense-partner-apps/4491669" target="_blank" rel="noopener noreferrer"&gt;Support tip: Resolve device noncompliance with Mobile Threat Defense partner apps&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftintune/blog/intunecustomersuccess" target="_blank" rel="noopener noreferrer"&gt;Intune Customer Success&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/intune_support_team/226779" target="_blank" rel="noopener noreferrer"&gt;Intune_Support_Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/02/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article explains how to resolve device noncompliance issues in Microsoft Intune when using Mobile Threat Defense (MTD) partner apps like Microsoft Defender for Endpoint. It outlines steps for users to restore compliance, including installing or activating the MTD app, refreshing the app’s connection, or reinstalling it. It also details simplified remediation for iOS/iPadOS and steps to refresh the MTD connection on Android if sign-out is blocked. The guidance helps organizations ensure device compliance and secure access to work or school resources while reducing support overhead.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearcblog/announcing-public-preview-simplified-machine-provisioning-for-azure-local/4496811" target="_blank" rel="noopener noreferrer"&gt;Announcing Public Preview: Simplified Machine Provisioning for Azure Local&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearcblog" target="_blank" rel="noopener noreferrer"&gt;Azure Arc&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/pragyadwivedi/1475983" target="_blank" rel="noopener noreferrer"&gt;PragyaDwivedi&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has announced the public preview of Simplified Machine Provisioning for Azure Local, streamlining edge infrastructure deployment by shifting configuration to Azure. IT teams can now centrally define and automate provisioning using Azure Arc, with minimal onsite interaction—staff only need to rack, power on hardware, and use a prepared USB. Built on the FIDO Device Onboarding standard, this approach ensures secure, consistent device onboarding and management at scale, with end-to-end deployment visibility. This new process enables faster, less error-prone deployments, allowing organizations to efficiently provision and manage Azure Local infrastructure across multiple sites.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurenetworkingblog/unlock-outbound-traffic-insights-with-azure-standardv2-nat-gateway-flow-logs/4493138" target="_blank" rel="noopener noreferrer"&gt;Unlock outbound traffic insights with Azure StandardV2 NAT Gateway flow logs&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurenetworkingblog" target="_blank" rel="noopener noreferrer"&gt;Azure Networking&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/cozhang/2733179" target="_blank" rel="noopener noreferrer"&gt;cozhang&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/06/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article introduces the Azure StandardV2 NAT Gateway, highlighting new features such as zone-redundancy, enhanced throughput, dual-stack IP support, and the availability of flow logs. Flow logs provide detailed outbound traffic data, improving security, compliance, and troubleshooting. They help monitor traffic patterns, identify issues like connection drops, and optimize network architecture. The article explains enabling and using flow logs for diagnostics, emphasizing their value in validating connectivity and auditing outbound flows, and encourages users to leverage these insights for resilient Azure deployments.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/itopstalkblog/migration-modernization--agentic-tools/4497193" target="_blank" rel="noopener noreferrer"&gt;Migration, Modernization &amp;amp; Agentic Tools&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/itopstalk/blog/itopstalkblog" target="_blank" rel="noopener noreferrer"&gt;ITOps Talk&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/orinthomas/251291" target="_blank" rel="noopener noreferrer"&gt;OrinThomas&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/25/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article discusses how agentic tools are transforming cloud migration and modernization by introducing autonomy, continuous optimization, and context-aware decision-making. Rather than a one-time process, migration becomes an ongoing, self-improving system with tools like Azure Copilot and GitHub Copilot. These tools automate environment discovery, recommend modernization paths, execute migrations, validate and optimize workloads, and ensure governance. They classify workloads, automate migration waves, and continuously enhance cost, performance, security, and compliance, reducing manual effort and errors while enabling safe, efficient, and policy-driven cloud transitions.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/itopstalkblog/automating-large%E2%80%91scale-data-management-with-azure-storage-actions/4496766" target="_blank" rel="noopener noreferrer"&gt;Automating Large‑Scale Data Management with Azure Storage Actions&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/itopstalk/blog/itopstalkblog" target="_blank" rel="noopener noreferrer"&gt;ITOps Talk&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/1nataraj/1439120" target="_blank" rel="noopener noreferrer"&gt;1Nataraj&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/25/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Storage Actions is a fully managed, serverless automation platform that enables customers to automate large-scale data management tasks—such as tiering, tagging, deletion, and applying immutability policies—across Azure Blob Storage and Data Lake Storage without custom code or infrastructure. It uses reusable, condition-based storage tasks and assignments, supporting compliance, cost optimization, and operational efficiency. The platform provides built-in monitoring, auditing, and preview features, making it suitable for scenarios requiring traceability. Common use cases include regulatory compliance, cost control, and metadata management across industries like finance, airlines, and manufacturing.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/securing-a-multi-agent-ai-solution-focused-on-user-context--the-complexities-of-/4493308" target="_blank" rel="noopener noreferrer"&gt;Securing A Multi-Agent AI Solution Focused on User Context &amp;amp; the Complexities of On-Behalf-Of.&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearchitectureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/charles_chukwudozie/1397778" target="_blank" rel="noopener noreferrer"&gt;Charles_Chukwudozie&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/11/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article outlines how an enterprise-grade multi-agent AI system was designed to securely preserve user identity and enforce access controls when AI agents interact with backend services like Databricks. By implementing Microsoft Entra ID’s On-Behalf-Of (OBO) flow, each AI agent operates strictly within the authenticated user’s permissions, maintaining RBAC policies and an audit trail. The solution uses a custom OAuth provider, per-user agent instances, and human-in-the-loop approval for sensitive operations, aligning with Zero Trust principles and ensuring robust AI governance for enterprise applications.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/reference-architecture-for-highly-available-multi-region-azure-kubernetes-servic/4490479" target="_blank" rel="noopener noreferrer"&gt;Reference Architecture for Highly Available Multi-Region Azure Kubernetes Service (AKS)&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearchitectureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/rgarofalo/3339583" target="_blank" rel="noopener noreferrer"&gt;rgarofalo&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/03/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; This article presents a reference architecture for deploying Azure Kubernetes Service (AKS) across multiple Azure regions to maximize availability and resilience. It compares active/active, active/passive, and deployment stamp patterns, detailing trade-offs in availability, complexity, and cost. Key components include Azure Front Door for global routing, geo-replicated data services, centralized monitoring, and consistent security. The article emphasizes clear design choices, regular testing, and operational preparedness, highlighting that multi-region resilience requires coordinated patterns, not a simple switch, and should align with business RTO/RPO objectives and operational maturity.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/public-preview-restrict-usage-of-user-delegation-sas-to-an-entra-id-identity/4497196" target="_blank" rel="noopener noreferrer"&gt;Public Preview: Restrict usage of user delegation SAS to an Entra ID identity&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurestorageblog" target="_blank" rel="noopener noreferrer"&gt;Azure Storage&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ellievail/3335667" target="_blank" rel="noopener noreferrer"&gt;ellievail&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has announced the public preview of user-bound user delegation SAS for Azure Storage, enhancing security by restricting SAS token usage to a specific Microsoft Entra ID identity. This extension of user delegation SAS ensures only the designated user can access storage resources, reducing the risk of unintended access. The feature is available at no additional cost in all public regions and supports cross-tenant scenarios. It integrates with existing Azure RBAC and is accessible via REST APIs, SDKs, PowerShell, and CLI. Setup involves assigning the correct roles, obtaining user IDs, and generating the SAS token.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/azure-migrate-now-supporting-premium-ssd-v2-ultra-and-zrs-disks-as-targets/4495332" target="_blank" rel="noopener noreferrer"&gt;Azure Migrate: Now Supporting Premium SSD V2, Ultra and ZRS Disks as Targets&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurestorageblog" target="_blank" rel="noopener noreferrer"&gt;Azure Storage&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/lakshya_jalan/3335140" target="_blank" rel="noopener noreferrer"&gt;Lakshya_Jalan&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/18/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; 321: No summary could be found for article: [Azure Migrate: Now Supporting Premium SSD V2, Ultra and ZRS Disks as Targets] [https://techcommunity.microsoft.com/blog/azurestorageblog/azure-migrate-now-supporting-premium-ssd-v2-ultra-and-zrs-disks-as-targets/4495332].&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/skills-hub-blog/bringing-ai-fluency-to-every-corner-of-the-organization-even-yours/4494105" target="_blank" rel="noopener noreferrer"&gt;Bringing AI fluency to every corner of the organization (even yours!)&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftlearn/blog/microsoftlearnblog" target="_blank" rel="noopener noreferrer"&gt;Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ashleymastershall/2703917" target="_blank" rel="noopener noreferrer"&gt;AshleyMastersHall&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/19/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article emphasizes the importance of AI fluency for all roles within organizations, likening AI’s impact to the transformative effect of GPS on navigation. It defines AI fluency as understanding and effectively using generative AI in care tasks, now a critical skill for the modern workplace. The author provides practical, approachable steps to integrate AI into daily workflows, recommends starting small, and highlights Microsoft’s AI Skills Navigator as a resource. The core message: AI is already changing work, and building fluency—starting with familiar tasks—ensures continued relevance and success.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/skills-hub-blog/microsoft-credentials-roundup-february-2026-edition/3666867" target="_blank" rel="noopener noreferrer"&gt;Microsoft Credentials roundup: February 2026 edition&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftlearn/blog/microsoftlearnblog" target="_blank" rel="noopener noreferrer"&gt;Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/pujaa/935445" target="_blank" rel="noopener noreferrer"&gt;PujaA&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft’s February 2026 Credentials roundup introduces four new AI-focused Certifications and six new Applied Skills, targeting both technical and business professionals. These credentials validate expertise in AI integration, Copilot, and agent solutions, enhancing career prospects in an AI-powered workplace. Applied Skills offer quick, practical assessments in real-world AI tasks. Several older Certifications and Applied Skills are being retired, reflecting Microsoft’s ongoing commitment to current, relevant skills. Additional AI-focused updates are planned for March 2026 and beyond, further expanding learning and credentialing opportunities in AI and cloud technologies.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/public-preview-automatic-zone-balance-for-virtual-machine-scale-sets/4494476" target="_blank" rel="noopener noreferrer"&gt;Public Preview: Automatic zone balance for Virtual Machine Scale Sets&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurecompute" target="_blank" rel="noopener noreferrer"&gt;Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/hilarywang/1637159" target="_blank" rel="noopener noreferrer"&gt;HilaryWang&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/17/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure has introduced the public preview of automatic zone balance for Virtual Machine Scale Sets, which ensures VMs are evenly distributed across availability zones with no manual intervention. This feature continuously monitors and rebalances VMs, minimizing the impact of zone failures and maintaining optimal resiliency. It uses a create-before-delete approach with health checks and built-in safety measures, reducing operational overhead and ensuring workload stability. Automatic instance repairs are enabled by default. To use this feature, register for the preview, meet prerequisites, and enable it via the Azure portal, CLI, PowerShell, or REST API.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/azure-automated-virtual-machine-recovery-minimizing-downtime/4483166" target="_blank" rel="noopener noreferrer"&gt;Azure Automated Virtual Machine Recovery: Minimizing Downtime&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurecompute" target="_blank" rel="noopener noreferrer"&gt;Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jon_andoni_baranda/3305512" target="_blank" rel="noopener noreferrer"&gt;Jon_Andoni_Baranda&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/04/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure Automated Virtual Machine Recovery is a built-in Azure feature designed to minimize VM downtime by automatically detecting, diagnosing, and mitigating failures within seconds, without customer intervention. It operates continuously, leveraging multiple detection mechanisms and optimized recovery paths, ensuring business continuity and consistent SLA compliance. Recovery Event Annotations provide deep visibility into the recovery process, helping identify bottlenecks and improve reliability. Over the past 18 months, this system has halved average VM downtime, empowering customers to confidently run resilient applications with reduced risk of service disruption and financial loss. No setup is required; all Azure VMs benefit automatically.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuretoolsblog/azure-cli-windows-msi-upgrade-issue-root-cause-mitigation-and-performance-improv/4491691" target="_blank" rel="noopener noreferrer"&gt;Azure CLI Windows MSI Upgrade Issue: Root Cause, Mitigation, and Performance Improvements&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuretoolsblog" target="_blank" rel="noopener noreferrer"&gt;Azure Tools&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/alex-wdy/1467559" target="_blank" rel="noopener noreferrer"&gt;Alex-wdy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 02/03/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 11 Mar 2026 15:55:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-february-2026/ba-p/4501272</guid>
      <dc:creator>TysonPaul</dc:creator>
      <dc:date>2026-03-11T15:55:52Z</dc:date>
    </item>
    <item>
      <title>The Nightmare of renewing NDES Enrollment Agent Certificates</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/the-nightmare-of-renewing-ndes-enrollment-agent-certificates/ba-p/4496052</link>
      <description>&lt;H1&gt;NDES EA Certificates – Quick Recap&lt;/H1&gt;
&lt;P&gt;By default, three version 1 certificate templates are assigned to your Certification Authority by the configuration routine of the NDES service:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;CEP Encryption&lt;/STRONG&gt; - Used by the device to encrypt communication with NDES&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exchange Enrollment Agent (Offline Request) &lt;/STRONG&gt;- Used to request certificates on behalf of another subject&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IPSec (Offline request)&amp;nbsp;&lt;/STRONG&gt;- Default template to enroll certificates to devices&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;All certificate templates from the list above are &lt;STRONG&gt;version 1 certificate templates&lt;/STRONG&gt;. Number 1 and 2 share the common characteristic of having the Extended Key Usage (EKU) extension set to include the OID 1.3.6.1.4.1.311.20.2.1, which corresponds to “&lt;STRONG&gt;Certificate Request Agent&lt;/STRONG&gt;”. In this article template number 1 and 2 (from the list above) will be referred to as “NDES Enrollment Agent certificate(s) templates”.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.9074%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-background-color-5 lia-border-color-10 lia-border-style-solid"&gt;
&lt;P&gt;Version 1 certificate templates originated with Windows 2000 and have functional and security limitations. Since the autoenrollment feature did not exist at that time, these templates do not support autoenrollment and instead rely on Automatic Certificate Request Settings, a legacy mechanism that is no longer recommended. Furthermore, the only property that can be modified on a version 1 template is the set of assigned permissions that controls access to the template. Find more details in&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/certificate-template-concepts" target="_blank" rel="noopener"&gt;Certificate Template Concepts&lt;/A&gt;.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 100%; border-width: 1px;"&gt;&lt;colgroup&gt;&lt;col style="width: 99.9074%" /&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-background-color-5 lia-border-color-10 lia-border-style-solid"&gt;
&lt;P&gt;Certificate Enrollment (or Request) Agents were designed to enable trusted principals to perform certificate enrollment on behalf of other users or devices (aka Enroll-on-behalf). NDES is a concrete implementation of this concept as it enrolls certificates for entities other than itself.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;The enrollment of the NDES EA certificates based on certificate templates number 1 and 2 (see above) during NDES configuration is hard‑coded in the configuration routine. This design choice from many years ago introduces several challenges:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Security: in case you misconfigure the default NDES certificate templates security settings, they are vulnerable to &lt;A href="https://msrc.microsoft.com/update-guide/advisory/CVE-2024-49019" target="_blank" rel="noopener"&gt;CVE-2024-49019.&lt;/A&gt; A detailed explanation of this vulnerability is out of scope here; however, as a general best practice, &lt;STRONG&gt;certificate templates version 1 should not be used&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;The default “Exchange Enrollment Agent (Offline request)” certificate template (default template number 2. as per above) is a user template and the installation routine “somehow magically” imports this certificate into the machine store. This makes automatic renewal challenging...&lt;/LI&gt;
&lt;LI&gt;Version 1 certificate templates have significant functional limitations, as they cannot be modified (except for security settings):
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;The validity period (2 years) cannot be changed. For NDES EA certificate templates the validity period is 2 years.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The template’s CSP&lt;A href="#community--1-_ftn1" target="_blank" rel="noopener" name="_ftnref1"&gt;[1]&lt;/A&gt; cannot be modified. As a result, NDES Enrollment Agent certificates cannot be enrolled in a Hardware Security Module (HSM).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Version 1 templates do not support Autoenrollment. Consequently, NDES service certificates therefore must be renewed manually. When the Enrollment Agent certificates expire, NDES stops working.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Version 1 templates lack template-level access control and modern enrollment safeguards (e.g. Certificate Manager Approval).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="#community--1-_ftnref1" target="_blank" rel="noopener" name="_ftn1"&gt;[1]&lt;/A&gt; NDES does not support KSP for EA certificates.&lt;/P&gt;
&lt;P&gt;As you can see, there are several reasonable arguments to replace the default NDES service certificate templates.&lt;/P&gt;
&lt;H1&gt;Configuring custom NDES Service Certificate Templates&lt;/H1&gt;
&lt;P&gt;Generally, there are two ways of creating some kind of “fire and forget” certificate templates for NDES:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Common &lt;STRONG&gt;Windows Active Directory Autoenrollment&lt;/STRONG&gt; can be used if there is no need for a custom name/subject in the request agent certificates.&lt;/LI&gt;
&lt;LI&gt;We can use&lt;STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/server-2012-pki-key-based-renewal-explained/256275" target="_blank" rel="noopener"&gt;key-based renewal (KBR)&lt;/A&gt;&lt;/STRONG&gt; which allows us to create custom subjects in the certificates even together with automatic renewals.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The NDES service will not verify the certificates’ subject information. It will just verify that the certificates have “request Agent” EKU (1.3.6.1.4.1.311.20.2.1).&lt;/P&gt;
&lt;P&gt;In a nutshell, you will need to duplicate two version 1 certificate templates and modify those to fit your needs. See table below for detailed description of settings.&lt;/P&gt;
&lt;P&gt;In addition to that, there are a few more things to consider:&lt;/P&gt;
&lt;H2&gt;NDES service account&lt;/H2&gt;
&lt;P&gt;There are different options for creating the SCEP IIS App Pool identity. As Microsoft recommends using a &lt;STRONG&gt;hardened Tier 0 domain user account&lt;/STRONG&gt;, this article will focus on this configuration. By default, domain user accounts do not have any permissions on private keys in the computer certificate store. Therefore, you must grant READ permissions to the NDES service certificate private keys either manually or in the certificate template configuration. This can be configured on the &lt;STRONG&gt;Request Handling&lt;/STRONG&gt; tab as we will see later in this article.&lt;/P&gt;
&lt;H2&gt;(Source) Certificate Templates to duplicate&lt;/H2&gt;
&lt;P&gt;Certificate templates include a flag that is hidden from the GUI and determines whether a template is treated as a user or a computer certificate template. If you are curious, the command &lt;EM&gt;certutil -ds -v “CEPEncryption” &lt;/EM&gt;will make it visible. Look out for CT_FLAG_MACHINE_TYPE in the output. This distinction is important in our scenario because the &lt;STRONG&gt;Exchange Enrollment Agent (Offline Request)&lt;/STRONG&gt; template does &lt;STRONG&gt;not&lt;/STRONG&gt; include this flag. As a result, certificates based on this template can only be enrolled into the &lt;STRONG&gt;user certificate store&lt;/STRONG&gt;. To ensure the new template replacing the Exchange Enrollment Agent (Offline Request) template supports enrollment into the &lt;STRONG&gt;computer certificate store&lt;/STRONG&gt;, we use the &lt;STRONG&gt;Enrollment Agent (Computer)&lt;/STRONG&gt; default template as the source template.&lt;/P&gt;
&lt;H3&gt;Subject and SAN for NDES Service Certificates&lt;/H3&gt;
&lt;P&gt;Subject/SAN can either be built from Active Directory or provided in the request.&lt;/P&gt;
&lt;H4&gt;a) Build (subject) from this Active Directory information (option 1 from above – using common &lt;STRONG&gt;autoenrollment&lt;/STRONG&gt;)&lt;/H4&gt;
&lt;P&gt;Using Common Name and DNS name is common practice. Subject and/or SAN will simply include the NDES computer account name.&lt;/P&gt;
&lt;P&gt;As this may not be appropriate in all scenarios, we also have option...&lt;/P&gt;
&lt;H4&gt;b) Supply (subject) in the request (option 2 from above – using &lt;STRONG&gt;key-based renewal&lt;/STRONG&gt;)&lt;/H4&gt;
&lt;P&gt;While this option gives you the freedom of choosing a proper Enrollment Agent subject information and SAN, it comes at the price of some additional configuration requirements to allow secure and automatic renewal of NDES service certificates. Using the &lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/server-2012-pki-key-based-renewal-explained/256275" target="_blank" rel="noopener"&gt;key based renewal&lt;/A&gt; feature, we will have to initially enroll the NDES service certificates manually. Renewal will happen automatically. To implement this, both NDES service certificate templates must be configured as described below:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Subject Name&lt;/STRONG&gt; tab&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issuance Requirements&lt;/STRONG&gt; tab&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Extensions&lt;/STRONG&gt; tab&lt;/P&gt;
&lt;P&gt;“Certificate Request Agent” is the only Application Policy required.&lt;/P&gt;
&lt;P&gt;Please note that “Client Authentication” is required as an additional Application Policy in case you use CEP and CES for key based renewal.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Request Handling&lt;/STRONG&gt; and &lt;STRONG&gt;Security&amp;nbsp;&lt;/STRONG&gt;tab&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;H3&gt;NDES EA Certificate Template Configuration Summary&lt;/H3&gt;
&lt;table border="1" style="width: 100%; height: 104.702px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 34.9006px;"&gt;&lt;td style="height: 34.9006px;"&gt;Default NDES service certificate template&lt;/td&gt;&lt;td style="height: 34.9006px;"&gt;CEP Encryption&lt;/td&gt;&lt;td style="height: 34.9006px;"&gt;Exchange Enrollment Agent (Offline Request)&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.9006px;"&gt;&lt;td style="height: 34.9006px;"&gt;Template to duplicate&lt;/td&gt;&lt;td style="height: 34.9006px;"&gt;CEP Encryption&lt;/td&gt;&lt;td style="height: 34.9006px;"&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-8"&gt;Enrollment Agent (Computer)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 34.9006px;"&gt;&lt;td style="height: 34.9006px;"&gt;Compatibility settings&lt;/td&gt;&lt;td colspan="2" style="height: 34.9006px;"&gt;
&lt;UL&gt;
&lt;LI&gt;Certification Authority: Windows Server 2016&lt;/LI&gt;
&lt;LI&gt;Certificate recipient: Windows 10/Windows Server 2016&lt;/LI&gt;
&lt;/UL&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;General&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;Provide a name for the new certificate template.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Request Handling&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;In case the SCEP AppPool is configured to run in the security context of a domain account, you must grant READ access to the private key to the NDES service account. Otherwise, no changes are required on this tab.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Cryptography&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;If available, configure an HSM backed CSP or adjust the key length as required. Note that Key Storage Providers (KSPs) are not supported for NDES service certificates.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Subject Name&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;Either choose &lt;STRONG&gt;Build&lt;/STRONG&gt; &lt;STRONG&gt;from this Active Directory information &lt;/STRONG&gt;or choose &lt;STRONG&gt;Supply in the request + key-based renewal.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Issuance Requirements&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;Because of NDES’ Enroll-on-behalf capability described above, the NDES service certificates are very powerful. &lt;STRONG&gt;We therefore recommend enforcing CA certificate manager approval&lt;/STRONG&gt; for enrollment. Please keep in mind that this will interrupt the automatic renewal process of the certificate if not using KBR.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Extensions&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;The default Application Policy is &lt;STRONG&gt;Certificate Request Agent&lt;/STRONG&gt;. Do not change it.&lt;/P&gt;
&lt;P&gt;In case key based renewal is enabled, Client Authentication must be added as an Application Policy.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Security&lt;/td&gt;&lt;td colspan="2"&gt;
&lt;P&gt;Grant &lt;STRONG&gt;ENROLL&lt;/STRONG&gt; and &lt;STRONG&gt;AUTOENROLL*&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;permissions to the &lt;STRONG&gt;NDES Computer account&lt;/STRONG&gt; only.&lt;BR /&gt;* Autoenrollment only makes sense for option a - Autoenrollment&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H2&gt;Housekeeping&lt;/H2&gt;
&lt;P&gt;After new EA certificates have been enrolled…&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Unassign version 1 certificate templates from all CAs&lt;/LI&gt;
&lt;LI&gt;Revoke all previously issued NDES EA certificates and remove them from NDES server.&lt;/LI&gt;
&lt;LI&gt;Restart NDES service (execute to reload the web service and certificates)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Final Thoughts&lt;/H2&gt;
&lt;P&gt;NDES Enrollment Agent certificates are highly privileged and should never rely on legacy version 1 templates. Replacing them with custom templates that support HSMs and secure automatic renewal significantly reduces outage risk and closes known security gaps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 07:28:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/the-nightmare-of-renewing-ndes-enrollment-agent-certificates/ba-p/4496052</guid>
      <dc:creator>DagmarHeidecker</dc:creator>
      <dc:date>2026-03-09T07:28:55Z</dc:date>
    </item>
    <item>
      <title>The Future of Identity: Self-Service Account Recovery (Preview) in Microsoft Entra</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/the-future-of-identity-self-service-account-recovery-preview-in/ba-p/4499749</link>
      <description>&lt;P&gt;In the modern enterprise, the "Help Desk" is paradoxically both a vital resource and a massive security liability. As organizations move toward phishing-resistant, passwordless environments using passkeys and FIDO2 tokens, a critical question remains: &lt;STRONG&gt;What happens when a user loses their only authentication device?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Historically, this required a phone call to a support agent. However, in an era of sophisticated social engineering and AI-generated deepfakes, a human agent is often the easiest point of entry for an attacker. Microsoft Entra’s new &lt;STRONG&gt;Self-Service Account Recovery&lt;/STRONG&gt; solves this by replacing manual verification with high-assurance, automated identity proofing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Fatal Flaw in Traditional Recovery&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Most organizations currently rely on one of two methods for recovery, both of which have significant drawbacks:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Self-Service Password Reset (SSPR):&lt;/STRONG&gt; Often relies on "weak" factors like SMS codes or security questions. These are easily intercepted or guessed and don't help a user who is trying to move away from passwords entirely.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;The Help Desk:&lt;/STRONG&gt; Requires an agent to "vouch" for a user. Attackers can impersonate employees, use voice-cloning technology, or provide leaked personal information to trick an agent into issuing a Temporary Access Pass (TAP).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The new Entra flow removes the human element from the validation process, ensuring that the person regaining access is exactly who they claim to be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How the New Recovery Flow Works:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The recovery process is built on the concept of "identity proofing," utilizing government-issued documents and biometric liveness checks.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Integration with Verification Partners&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Microsoft doesn’t store your passport or driver's license. Instead, Entra integrates with specialized Third-Party Identity Verification providers (such as True Credential, IDEMIA, AU10TIX). These services are experts in forensic document analysis.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; The Verification Process&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;When a user begins a recovery, they are redirected to the partner service. The process typically involves:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Document Capture:&lt;/STRONG&gt; The user takes a photo of a government ID (Passport, Driver’s License, etc.).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Forensic Analysis:&lt;/STRONG&gt; The service checks for security features like holograms, fonts, and watermarks to ensure the ID is genuine.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Liveness Check:&lt;/STRONG&gt; The user takes a "selfie" or video. The system uses "Face Check" technology projecting specific light patterns or colors on the user’s face to ensure it is a live person and not a photo, video, or deepfake.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Issuance of a Verified ID&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once the third party confirms the user's identity, Microsoft Entra issues Verified ID. This is a decentralized, digital credential that sits in the user's Microsoft Authenticator app. It serves as digital proof of their identity that Entra can trust.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt; The Final Handshake: Face Check&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;To bridge the gap between the digital credential and the person at the keyboard, Entra performs a &lt;STRONG&gt;Face Check&lt;/STRONG&gt;. It compares the live user's face against the photo contained within the Verified ID. If they match, Entra considers the identity "proven."&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;&lt;STRONG&gt; Bootstrapping the New Device&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once verified, Entra automatically issues a &lt;STRONG&gt;Temporary Access Pass (TAP)&lt;/STRONG&gt;. This allows the user to log in and immediately register their new device, passkey, or Authenticator app, effectively "bootstrapping" their new secure environment without ever speaking to a human.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Strategic Advantages for IT Leaders&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust Maturity:&lt;/STRONG&gt; This process fulfills the Zero Trust requirement of "explicit verification" even during the recovery phase.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Scalability:&lt;/STRONG&gt; By automating the most time-consuming part of help desk tickets identity verification IT teams can focus on more complex tasks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Phishing Resistance:&lt;/STRONG&gt; Because the recovery is tied to physical ID and biometrics, there is no "code" for an attacker to phish.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Global Compliance:&lt;/STRONG&gt; Leveraging government-issued IDs allows organizations to meet high-bar regulatory requirements for identity assurance (such as NIST IAL2).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Deployment and Prerequisites&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To implement this, administrators need to ensure a few things are in place:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Verified ID Setup:&lt;/STRONG&gt; You must configure Microsoft Entra Verified ID within your tenant.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Matching Logic:&lt;/STRONG&gt; Entra uses attributes like First Name and Last Name to match the Verified ID to the user account. Ensuring your HR data is clean and synchronized is essential.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;License &amp;amp; Costs:&lt;/STRONG&gt; While the recovery flow is a feature of Entra, the verification partners and the Face Check service (typically a per-check fee) must be provisioned through the Microsoft Security Store.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The transition to a passwordless world is incomplete if the "back door" (recovery) remains open and insecure. By integrating government-grade identity verification directly into the login flow, Microsoft Entra provides the final piece of the puzzle: a recovery method that is as secure as the primary login itself.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2026 16:47:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/the-future-of-identity-self-service-account-recovery-preview-in/ba-p/4499749</guid>
      <dc:creator>Farooque</dc:creator>
      <dc:date>2026-03-05T16:47:10Z</dc:date>
    </item>
    <item>
      <title>Demystifying the Client Repeatable Feature in Edge</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/demystifying-the-client-repeatable-feature-in-edge/ba-p/4498346</link>
      <description>&lt;P&gt;Autofill behavior in modern browsers can sometimes feel confusing—especially when suggestions suddenly stop appearing even though data is still being entered correctly. In Microsoft Edge, this behavior is often caused by a feature called the &lt;STRONG&gt;Client Repeatable Feature&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;This article explains how Autofill works in Edge, how &lt;STRONG&gt;Frequently Saved Data (FSD)&lt;/STRONG&gt; and &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt; are used, why Autofill suggestions get blocked, and how this behavior differs from other Chromium-based browsers like Google Chrome.&lt;/P&gt;
&lt;H2&gt;How Autofill Works in Edge&lt;/H2&gt;
&lt;P&gt;At a basic level, Microsoft Edge stores and reuses form data based on the name of a form field. More precisely, it uses a value called the &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;If two input fields share the same &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt;, Edge assumes they represent the same type of data and will show the same Autofill suggestions for both fields.&lt;/P&gt;
&lt;P&gt;For example, if a field called EmailAddress exists in two different forms, Edge will show the same Autofill values in both—even if those forms are completely unrelated.&lt;/P&gt;
&lt;P&gt;This behavior is part of the &lt;STRONG&gt;Frequently Saved Data (FSD)&lt;/STRONG&gt; feature.&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Frequently Saved Data (FSD) and Chromium&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;Frequently Saved Data (FSD)&lt;/STRONG&gt; feature originates from the Chromium project and is used by Microsoft Edge. Because of this, this part of Autofill behavior should be identical to other Chromium-based browsers, such as Google Chrome.&lt;/P&gt;
&lt;P&gt;An important detail is that FSD works across domains. It is not limited to a specific website or URL.&lt;/P&gt;
&lt;P&gt;This means that a field with the &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt; EmailAddress on&lt;BR /&gt;www.contoso.com/someform&lt;BR /&gt;will show the same Autofill suggestions as a field with the same &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt; on&lt;BR /&gt;www.microsoft.com/someotherform.&lt;/P&gt;
&lt;P&gt;FSD only cares about the &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt;, not the website, URL, or form structure.&lt;/P&gt;
&lt;H2&gt;What Is the Client Repeatable Feature?&lt;/H2&gt;
&lt;P&gt;The &lt;STRONG&gt;Client Repeatable Feature&lt;/STRONG&gt; is a Microsoft Edge–specific feature. It does not originate from the Chromium project. Because of this, its behavior may differ from what you see in Google Chrome or other Chromium-based browsers.&lt;/P&gt;
&lt;P&gt;This feature is designed to reduce noisy or repetitive Autofill suggestions. It does this by monitoring how many different values are entered into a field within the same form.&lt;/P&gt;
&lt;H2&gt;When and Why Autofill Gets Blocked&lt;/H2&gt;
&lt;P&gt;If five different values are entered consecutively into the same field within the same form, the &lt;STRONG&gt;Client Repeatable Feature&lt;/STRONG&gt; becomes active.&lt;/P&gt;
&lt;P&gt;When this happens:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Autofill suggestions are blocked&lt;/LI&gt;
&lt;LI&gt;No suggestion popup is shown&lt;/LI&gt;
&lt;LI&gt;New values are still saved internally&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The key point is that this blocking is &lt;STRONG&gt;form-specific&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Edge identifies a form using a hash value called &lt;STRONG&gt;Form SignatureV2&lt;/STRONG&gt;. The Autofill block applies only to the form with that specific &lt;STRONG&gt;Form SignatureV2&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;If another form exists with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;a different &lt;STRONG&gt;Form SignatureV2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;but the same &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Autofill suggestions will still appear in that other form—until the same five-value rule is triggered there as well.&lt;/P&gt;
&lt;H2&gt;How to Unblock Autofill Suggestions&lt;/H2&gt;
&lt;P&gt;Blocking caused by the &lt;STRONG&gt;Client Repeatable Feature&lt;/STRONG&gt; is not permanent.&lt;/P&gt;
&lt;P&gt;To remove the block, one of the five previously entered values that were stored as &lt;STRONG&gt;Frequently Saved Data (FSD)&lt;/STRONG&gt; must be typed again in full.&lt;/P&gt;
&lt;P&gt;Partial input is not enough. Typing only part of a previously used value will not lift the block.&lt;/P&gt;
&lt;P&gt;Once a complete previously saved value is entered:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Autofill suggestions become visible again&lt;/LI&gt;
&lt;LI&gt;All values that were saved during the blocked phase will also appear&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;However, unblocking only resets an internal counter. If five new, different values are entered consecutively again, the block will be reactivated.&lt;/P&gt;
&lt;H2&gt;Clearing Autofill Data via Edge Settings&lt;/H2&gt;
&lt;P&gt;In addition to unblocking Autofill by re-entering a previously saved value, &lt;STRONG&gt;all Autofill suggestions can also be removed manually via the Edge settings&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Autofill data can be cleared under:&lt;/P&gt;
&lt;P&gt;edge://settings/privacy/clearBrowsingData&lt;/P&gt;
&lt;P&gt;In the &lt;STRONG&gt;Delete browsing data&lt;/STRONG&gt; dialog:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Set &lt;STRONG&gt;Time range&lt;/STRONG&gt; to &lt;STRONG&gt;All time&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Enable &lt;STRONG&gt;Autofill form data (includes forms and cards)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Clear now&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This removes all saved Autofill entries, including data affected by the &lt;STRONG&gt;Client Repeatable Feature&lt;/STRONG&gt;.&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Debugging Autofill Behavior in Edge&lt;/H2&gt;
&lt;P&gt;Microsoft Edge provides a useful debugging option to better understand Autofill behavior.&lt;/P&gt;
&lt;P&gt;By enabling &lt;STRONG&gt;Show Autofill Predictions&lt;/STRONG&gt; under&lt;BR /&gt;edge://flags&lt;BR /&gt;you can inspect Autofill metadata directly.&lt;/P&gt;
&lt;P&gt;After enabling the flag, hovering over a form field will display values such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Parsable Name&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Form SignatureV2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This makes it much easier to understand why Autofill suggestions appear—or why they don’t.&lt;/P&gt;
&lt;P&gt;For hands-on testing, Autofill behavior can also be explored on the Autofill Smoke Test page: https://rsolomakhin.github.io/autofill/&lt;/P&gt;
&lt;H3&gt;Inspecting Autofill Data on Disk (Advanced)&lt;/H3&gt;
&lt;P&gt;Autofill data in Microsoft Edge is stored locally on disk in a SQLite database file named &lt;STRONG&gt;Web Data&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The file can be found at:&lt;/P&gt;
&lt;P&gt;C:\Users\&amp;lt;username&amp;gt;\AppData\Local\Microsoft\Edge\User Data\&amp;lt;profilename&amp;gt;\Web Data&lt;/P&gt;
&lt;P&gt;Key details:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The file uses &lt;STRONG&gt;SQLite format&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;It contains Autofill-related tables and metadata&lt;/LI&gt;
&lt;LI&gt;It can be inspected using common SQLite viewers such as &lt;STRONG&gt;DB Browser for SQLite&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://sqlitebrowser.org/dl/" target="_blank"&gt;https://sqlitebrowser.org/dl/&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This is useful for advanced debugging scenarios, for example when validating which values are stored internally or confirming that data is still saved even when Autofill suggestions are temporarily blocked.&lt;/P&gt;
&lt;H2&gt;The Last Used Feature&lt;/H2&gt;
&lt;P&gt;For completeness, Edge also includes the &lt;STRONG&gt;Last Used Feature&lt;/STRONG&gt;. This feature does not affect the blocking behavior described above and is mentioned here for informational purposes only.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Last Used&lt;/STRONG&gt; uses information from the entire form—not just the field name—to determine which value was entered most recently. Differences in labels or surrounding text can be enough to distinguish forms.&lt;/P&gt;
&lt;P&gt;To do this, the feature also relies on &lt;STRONG&gt;Form SignatureV2&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H2&gt;Final Thoughts&lt;/H2&gt;
&lt;P&gt;Understanding the difference between &lt;STRONG&gt;Parsable Name&lt;/STRONG&gt;, &lt;STRONG&gt;Frequently Saved Data (FSD)&lt;/STRONG&gt;, and the &lt;STRONG&gt;Client Repeatable Feature&lt;/STRONG&gt; helps explain many Autofill behaviors that might otherwise look like bugs.&lt;/P&gt;
&lt;P&gt;In short:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;FSD is Chromium-based and works across domains&lt;/LI&gt;
&lt;LI&gt;Client Repeatable Feature is Edge-specific and form-scoped&lt;/LI&gt;
&lt;LI&gt;Autofill blocking is temporary and counter-based&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once these concepts are clear, Autofill behavior in Edge becomes far more predictable—and much easier to debug.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 07:09:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/demystifying-the-client-repeatable-feature-in-edge/ba-p/4498346</guid>
      <dc:creator>hewagen</dc:creator>
      <dc:date>2026-03-02T07:09:40Z</dc:date>
    </item>
    <item>
      <title>Running Text to Image and Text to Video with ComfyUI and Nvidia H100 GPU</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/running-text-to-image-and-text-to-video-with-comfyui-and-nvidia/ba-p/4497978</link>
      <description>&lt;P&gt;This guide provides instructions on how to set up and run&amp;nbsp;&lt;STRONG&gt;Text to Image&lt;/STRONG&gt; and &lt;STRONG&gt;Text to Video&lt;/STRONG&gt;&amp;nbsp;generation using &lt;STRONG&gt;ComfyUI&lt;/STRONG&gt; with an &lt;STRONG&gt;Nvidia H100 GPU&lt;/STRONG&gt; on Azure VMs.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.comfy.org/" target="_blank" rel="noopener"&gt;ComfyUI&lt;/A&gt; is a node-based user interface for Stable Diffusion and other AI models. It allows users to create complex workflows for image and video generation using a visual interface. With the power of GPUs, you can significantly speed up the generation process for high-quality images and videos.&lt;/P&gt;
&lt;H3&gt;Steps to create the infrastructure&lt;/H3&gt;
&lt;H4&gt;Option 1. Using Terraform (Recommended)&lt;/H4&gt;
&lt;P&gt;In this guide, the provided Terraform template available here: &lt;A href="https://github.com/HoussemDellai/ai-course/tree/main/550_comfyui_on_vm" target="_blank" rel="noopener"&gt;ai-course/550_comfyui_on_vm at main · HoussemDellai/ai-course&lt;/A&gt; will create the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create the infrastructure for &lt;STRONG&gt;Ubuntu VM&lt;/STRONG&gt; with&amp;nbsp;&lt;STRONG&gt;Nvidia H100 GPU&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Install &lt;STRONG&gt;CUDA drivers&lt;/STRONG&gt; on the VM&lt;/LI&gt;
&lt;LI&gt;Install&amp;nbsp;&lt;STRONG&gt;ComfyUI&lt;/STRONG&gt;&amp;nbsp;on the VM&lt;/LI&gt;
&lt;LI&gt;Download the models for Text to Image (&lt;STRONG&gt;Z-Image-Turbo&lt;/STRONG&gt;) and Text to Video generation (&lt;STRONG&gt;Wan 2.2&lt;/STRONG&gt; and &lt;STRONG&gt;LTX-2&lt;/STRONG&gt;)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Deploy the Terraform template using the following commands:&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;# Initialize Terraform
terraform init
# Review the Terraform plan
terraform plan tfplan
# Apply the Terraform configuration to create resources
terraform apply tfplan&lt;/LI-CODE&gt;
&lt;P&gt;This should take about 15 minutes to create all the resources with the configuration defined in the Terraform files. The following resources will be created:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;If you choose to use Terraform, after the deployment is complete, you can access the ComfyUI portal using the output link shown in the Terraform output. It should look like this&amp;nbsp;&lt;STRONG&gt;http://&amp;lt;VM_IP_ADDRESS&amp;gt;:8188&lt;/STRONG&gt;. And that should be the end of the setup. You can then proceed to use ComfyUI for Text to Image and Text to Video generation as described in the later sections.&lt;/P&gt;
&lt;H4&gt;Option 2. Manual Setup&lt;/H4&gt;
&lt;H5&gt;0. Create a Virtual Machine with Nvidia H100 GPU&lt;/H5&gt;
&lt;P&gt;Create an Azure virtual machine with&amp;nbsp;&lt;STRONG&gt;Nvidia H100&lt;/STRONG&gt;&amp;nbsp;GPUs like sku:&amp;nbsp;&lt;STRONG&gt;Standard NC40ads H100 v5&lt;/STRONG&gt;. Choose a Linux distribution of your choice like&amp;nbsp;&lt;STRONG&gt;Ubuntu Pro 24.04 LTS&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H5&gt;1. Install Nvidia GPU and CUDA Drivers&lt;/H5&gt;
&lt;P&gt;SSH into the Ubuntu VM and install the CUDA drivers by following the official Microsoft documentation: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/linux/n-series-driver-setup#install-cuda-drivers-on-n-series-vms" target="_blank" rel="noopener"&gt;Install CUDA drivers on N-series VMs&lt;/A&gt;.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;# 1. Install ubuntu-drivers utility:
sudo apt-get update
sudo apt-get install ubuntu-drivers-common -y

# 2. Install the latest NVIDIA drivers:
sudo ubuntu-drivers install

# 3. Download and install the CUDA toolkit from NVIDIA:
wget https://developer.download.nvidia.com/compute/cuda/repos/ubuntu2404/x86_64/cuda-keyring_1.1-1_all.deb
sudo dpkg -i cuda-keyring_1.1-1_all.deb
sudo apt-get update
sudo apt-get -y install cuda-toolkit-13-1

# 4. Reboot the system to apply changes
sudo reboot&lt;/LI-CODE&gt;
&lt;P&gt;The machine will now reboot. After rebooting, you can verify the installation of the NVIDIA drivers and CUDA toolkit.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;# 5. Verify that the GPU is correctly recognized (after reboot):
nvidia-smi

# 6. We recommend that you periodically update NVIDIA drivers after deployment.
sudo apt-get update
sudo apt-get full-upgrade -y&lt;/LI-CODE&gt;
&lt;H4&gt;2. Install ComfyUI on Ubuntu&lt;/H4&gt;
&lt;P&gt;Follow the instructions from the ComfyUI Wiki to install ComfyUI on your Ubuntu VM using Comfy CLI: &lt;A class="lia-external-url" href="https://comfyui-wiki.com/en/install/install-comfyui/install-comfyui-on-linux" target="_blank" rel="noopener"&gt;Install ComfyUI using Comfy CLI&lt;/A&gt;.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;# Step 1: System Environment Preparation
# ComfyUI requires Python 3.12 or higher (Python 3.13 is recommended). Check your Python version:
python3 --version

# If Python is not installed or the version is too low, install it following these steps:
sudo apt-get update
sudo apt-get install python3 python3-pip python3-venv -y

# Create Virtual Environment
# Using a virtual environment can avoid package conflict issues
python3 -m venv comfy-env

# Activate the virtual environment
source comfy-env/bin/activate

# Note: You need to activate the virtual environment each time before using ComfyUI. To exit the virtual environment, use the deactivate command.
# Step 2: Install Comfy CLI
# Install comfy-cli in the activated virtual environment:
pip install comfy-cli

# Step 3: Install ComfyUI using Comfy CLI with NVIDIA GPU Support
# use 'yes' to accept all prompts
yes | comfy install --nvidia

# Step 4: Install GPU Support for PyTorch
pip install torch torchvision torchaudio --extra-index-url https://download.pytorch.org/whl/cu130

# Note: Please choose the corresponding PyTorch version based on your CUDA version. Visit the PyTorch website for the latest installation commands.

# Step 5. Launch ComfyUI
# By default, ComfyUI will run on http://localhost:8188.
# and don't forget the double --
comfy launch --background -- --listen 0.0.0.0 --port 8188&lt;/LI-CODE&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Note that you can run ComfyUI with different modes based on your hardware capabilities:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;--cpu&lt;/STRONG&gt;: Use CPU mode, if you don't have a compatible GPU&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;--lowvram&lt;/STRONG&gt;: Low VRAM mode&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;--novram&lt;/STRONG&gt;: Ultra-low VRAM mode&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;3. Using ComfyUI for Text to Image&lt;/H4&gt;
&lt;P&gt;Once ComfyUI is running, you can access the web interface via your browser at&amp;nbsp;&lt;STRONG&gt;http://&amp;lt;VM_IP_ADDRESS&amp;gt;:8188&lt;/STRONG&gt; (replace &amp;lt;VM_IP_ADDRESS&amp;gt; with the actual IP address of your VM).&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Note that you should ensure that the VM's network security group (NSG) allows inbound traffic on port&amp;nbsp;&lt;STRONG&gt;8188&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You can create Text to Image generation workflows using the templates available in ComfyUI.&lt;/P&gt;
&lt;P&gt;Go to Workflows and select a Text to Image template to get started. Choose&amp;nbsp;&lt;STRONG&gt;Z-Image-Turbo Text to Image&lt;/STRONG&gt; as an example.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;After that, ComfyUI will detect that there are some missing models to download.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;You will need to download each model into its corresponding folder. For example, the Stable Diffusion model should be placed in the&amp;nbsp;&lt;STRONG&gt;models/Stable-diffusion&lt;/STRONG&gt; folder. The models download links and their corresponding folders are shown in the ComfyUI interface. Let's download the required models for &lt;STRONG&gt;Z-Image-Turbo&lt;/STRONG&gt;.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;cd comfy/ComfyUI/
wget -P models/text_encoders/ https://huggingface.co/Comfy-Org/z_image_turbo/resolve/main/split_files/text_encoders/qwen_3_4b.safetensors
wget -P models/vae/ https://huggingface.co/Comfy-Org/z_image_turbo/resolve/main/split_files/vae/ae.safetensors
wget -P models/diffusion_models/ https://huggingface.co/Comfy-Org/z_image_turbo/resolve/main/split_files/diffusion_models/z_image_turbo_bf16.safetensors
wget -P models/loras/ https://huggingface.co/tarn59/pixel_art_style_lora_z_image_turbo/resolve/main/pixel_art_style_z_image_turbo.safetensors&lt;/LI-CODE&gt;&lt;img /&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Note that here you can either use &lt;STRONG&gt;comfy model download&lt;/STRONG&gt; command or &lt;STRONG&gt;wget&lt;/STRONG&gt; to download the models into their corresponding folders.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Once the models are downloaded, you can run the Text to Image workflow in ComfyUI. You can also change the parameters as needed like the prompt.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;When ready, click the Run blue button at the top right to start generating the image. It will take some time depending on the size of the image and the complexity of the prompt. Then you should see the generated image in the output node.&lt;/P&gt;
&lt;H4&gt;5. Using ComfyUI for Text to Video&lt;/H4&gt;
&lt;P&gt;To use ComfyUI for &lt;STRONG&gt;Text to Video&lt;/STRONG&gt; generation, you can select a Text to Video template from the Workflows section. Choose&amp;nbsp;&lt;STRONG&gt;Wan 2.2 Text to Video&lt;/STRONG&gt; as an example. Then you will need to install the required models.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;wget -P models/text_encoders/ https://huggingface.co/Comfy-Org/Wan_2.1_ComfyUI_repackaged/resolve/main/split_files/text_encoders/umt5_xxl_fp8_e4m3fn_scaled.safetensors

wget -P models/vae/ https://huggingface.co/Comfy-Org/Wan_2.2_ComfyUI_Repackaged/resolve/main/split_files/vae/wan_2.1_vae.safetensors

wget -P models/diffusion_models/ https://huggingface.co/Comfy-Org/Wan_2.2_ComfyUI_Repackaged/resolve/main/split_files/diffusion_models/wan2.2_t2v_low_noise_14B_fp8_scaled.safetensors  

wget -P models/diffusion_models/ https://huggingface.co/Comfy-Org/Wan_2.2_ComfyUI_Repackaged/resolve/main/split_files/diffusion_models/wan2.2_t2v_high_noise_14B_fp8_scaled.safetensors

wget -P models/loras/ https://huggingface.co/Comfy-Org/Wan_2.2_ComfyUI_Repackaged/resolve/main/split_files/loras/wan2.2_t2v_lightx2v_4steps_lora_v1.1_high_noise.safetensors

wget -P models/loras/ https://huggingface.co/Comfy-Org/Wan_2.2_ComfyUI_Repackaged/resolve/main/split_files/loras/wan2.2_t2v_lightx2v_4steps_lora_v1.1_low_noise.safetensors&lt;/LI-CODE&gt;
&lt;P&gt;Models for &lt;STRONG&gt;LTX-2&lt;/STRONG&gt; &lt;STRONG&gt;Text to Video&lt;/STRONG&gt; can be downloaded similarly.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;wget -P models/checkpoints/ https://huggingface.co/Lightricks/LTX-2/resolve/main/ltx-2-19b-dev-fp8.safetensors

wget -P models/text_encoders/ https://huggingface.co/Comfy-Org/ltx-2/resolve/main/split_files/text_encoders/gemma_3_12B_it_fp4_mixed.safetensors

wget -P models/latent_upscale_models/ https://huggingface.co/Lightricks/LTX-2/resolve/main/ltx-2-spatial-upscaler-x2-1.0.safetensors

wget -P models/loras/ https://huggingface.co/Lightricks/LTX-2/resolve/main/ltx-2-19b-distilled-lora-384.safetensors

wget -P models/loras/ https://huggingface.co/Lightricks/LTX-2-19b-LoRA-Camera-Control-Dolly-Left/resolve/main/ltx-2-19b-lora-camera-control-dolly-left.safetensors&lt;/LI-CODE&gt;
&lt;P&gt;Models for&amp;nbsp;&lt;STRONG&gt;Qwen Image 2512&lt;/STRONG&gt; Text to Image can be downloaded similarly.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;wget -P models/text_encoders/ https://huggingface.co/Comfy-Org/Qwen-Image_ComfyUI/resolve/main/split_files/text_encoders/qwen_2.5_vl_7b_fp8_scaled.safetensors

wget -P models/vae/ https://huggingface.co/Comfy-Org/Qwen-Image_ComfyUI/resolve/main/split_files/vae/qwen_image_vae.safetensors

wget -P models/diffusion_models/ https://huggingface.co/Comfy-Org/Qwen-Image_ComfyUI/resolve/main/split_files/diffusion_models/qwen_image_2512_fp8_e4m3fn.safetensors

wget -P models/loras/ https://huggingface.co/lightx2v/Qwen-Image-Lightning/resolve/main/Qwen-Image-Lightning-4steps-V1.0.safetensors&lt;/LI-CODE&gt;
&lt;P&gt;Models for &lt;STRONG&gt;Flux2 Klein Text to Image 9B&lt;/STRONG&gt; can be downloaded similarly.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;wget -P models/text_encoders/ https://huggingface.co/Comfy-Org/flux2-klein-9B/resolve/main/split_files/text_encoders/qwen_3_8b_fp8mixed.safetensors

wget -P models/vae/ https://huggingface.co/Comfy-Org/flux2-dev/resolve/main/split_files/vae/flux2-vae.safetensors

wget -P models/diffusion_models/ https://huggingface.co/black-forest-labs/FLUX.2-klein-base-9b-fp8/resolve/main/flux-2-klein-base-9b-fp8.safetensors

wget -P models/diffusion_models/ https://huggingface.co/black-forest-labs/FLUX.2-klein-9b-fp8/resolve/main/flux-2-klein-9b-fp8.safetensors&lt;/LI-CODE&gt;
&lt;H2&gt;&amp;nbsp;Important notes&lt;/H2&gt;
&lt;P&gt;Secure Boot is not supported using Windows or Linux extensions. For more information on manually installing GPU drivers with Secure Boot enabled, see Azure N-series GPU driver setup for Linux. Src: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/hpccompute-gpu-linux" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/hpccompute-gpu-linux&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;Sources&lt;/H4&gt;
&lt;P&gt;- Install CUDA drivers on N-series VMs: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/hpccompute-gpu-linux" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/virtual-machines/linux/n-series-driver-setup#install-cuda-drivers-on-n-series-vms&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;- Install ComfyUI using Comfy CLI: &lt;A class="lia-external-url" href="https://comfyui-wiki.com/en/install/install-comfyui/install-comfyui-on-linux" target="_blank" rel="noopener"&gt;https://comfyui-wiki.com/en/install/install-comfyui/install-comfyui-on-linux&lt;/A&gt;&lt;/P&gt;
&lt;H5&gt;Disclaimer&lt;/H5&gt;
&lt;P&gt;The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Feb 2026 23:35:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/running-text-to-image-and-text-to-video-with-comfyui-and-nvidia/ba-p/4497978</guid>
      <dc:creator>HoussemDellai</dc:creator>
      <dc:date>2026-02-27T23:35:57Z</dc:date>
    </item>
    <item>
      <title>Managed Identity on SQL Server On-Prem: The End of Stored Secrets</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/managed-identity-on-sql-server-on-prem-the-end-of-stored-secrets/ba-p/4496450</link>
      <description>&lt;H4&gt;The Problem with Credentials in SQL Server&lt;/H4&gt;
&lt;P&gt;For an On-Premises SQL Server to access Azure services, you traditionally need to store secrets:&lt;/P&gt;
&lt;H5&gt;Common Scenarios Requiring Credentials&lt;/H5&gt;
&lt;DIV&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Scenario&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Required Credential&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Backup to URL (Azure Blob)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Storage account key or SAS token&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Extensible Key Management (Azure Key Vault)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Service principal + secret&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Calling Azure OpenAI from T-SQL&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;API key&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;PolyBase to Azure Data Lake&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Service principal or key&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H5&gt;Associated Risks&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Manual Rotation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Secrets expire. You need to plan and execute rotation and not forget to update all references.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Secure Storage&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Where to store these secrets? In SQL Server via CREATE CREDENTIAL? In a config file? Each option has its risks.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Attack Surface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;A compromised secret gives access to associated Azure resources. The more secrets you have, the larger the attack surface.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Complex Auditing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Who has access to these secrets? When were they used? Tracking is difficult.&lt;/P&gt;
&lt;H4&gt;The Solution: Azure Arc + Managed Identity&lt;/H4&gt;
&lt;P&gt;SQL Server 2025 connected to Azure Arc can geta Managed Identity :&lt;/P&gt;
&lt;P&gt;This identity:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Is managed by Microsoft Entra ID&lt;/LI&gt;
&lt;LI&gt;Has no secret to store or rotate&lt;/LI&gt;
&lt;LI&gt;Can receive RBAC permissions on Azure resources&lt;/LI&gt;
&lt;LI&gt;Is centrally audited in Entra ID&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;How It Works&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;SQL Server 2025 On-Prem
&lt;UL&gt;
&lt;LI&gt;Azure Arc Agent installed on the server&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Managed Identity (automatically created in Entra ID)
&lt;UL&gt;
&lt;LI&gt;RBAC assignment on Azure resources
&lt;UL&gt;
&lt;LI&gt;-free access to Blob Storage, Key Vault, etc&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Step-by-Step Configuration&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Step 1&lt;/U&gt;&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Enable Azure Arc on the Server and/or Register SQL Server in Azure Arc&lt;/P&gt;
&lt;P&gt;Follow the procedure describes in this article to onboard your server in Azure Arc.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/connect?view=sql-server-ver17&amp;amp;tabs=windows%2Cazure-portal" target="_blank" rel="noopener"&gt;Connect Your SQL Server to Azure Arc&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;Remember that you can also evaluate Azure Arc on a Azure VM&amp;nbsp;&lt;STRONG&gt;(test use only)&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/plan-evaluate-on-azure-virtual-machine" target="_blank" rel="noopener"&gt;How to evaluate Azure Arc-enabled servers with an Azure virtual machine&lt;/A&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Step 2&lt;/U&gt;&lt;/STRONG&gt;&lt;STRONG&gt;: &lt;/STRONG&gt;Retrieve the Managed Identity&lt;/P&gt;
&lt;P&gt;The Managed Identity can be enabled and retrieved from Azure Arc | SQL Servers &amp;gt; “SQL Server instance” &amp;gt; Settings &amp;gt; Microsoft Entra ID&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-indent-padding-left-60px"&gt;Note: The Managed Identity is server-wide (not at the instance level)&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Step 3&lt;/U&gt;&lt;/STRONG&gt;: Assign RBAC Roles&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Granting access to a Storage Account for backups&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;LI-CODE lang="powershell"&gt;$sqlServerId = (az resource show --resource-group "MyRG" --name "ServerName" --resource-type "Microsoft.HybridCompute/machines" --query identity.principalId -o tsv)

az role assignment create --role "Storage Blob Data Contributor" `
    --assignee-object-id $sqlServerId `
    --scope "/subscriptions/xxx/resourceGroups/MyRG/providers/Microsoft.Storage/storageAccounts/mybackupaccount"&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ex:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Backup to URL Without Credential&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Before (with SAS token)&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;LI-CODE lang="sql"&gt;-- Create a credential with a SAS token (expires, must be rotated)
CREATE CREDENTIAL [https://mybackup.blob.core.windows.net/backups]
WITH IDENTITY = 'SHARED ACCESS SIGNATURE',
SECRET = 'sv=2022-11-02&amp;amp;ss=b&amp;amp;srt=sco&amp;amp;sp=rwdlacup...'


BACKUP DATABASE [MyDB]
TO URL = 'https://mybackup.blob.core.windows.net/backups/MyDB.bak'
WITH COMPRESSION&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;After (with Managed Identity&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="sql"&gt;--No secret anymore
CREATE CREDENTIAL [https://mybackup.blob.core.windows.net/backups]
WITH IDENTITY = 'Managed Identity'

BACKUP DATABASE [MyDB]
TO URL = 'https://mybackup.blob.core.windows.net/backups/MyDB.bak'
WITH COMPRESSION&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Extensible Key Management with Key Vault&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;EKM Configuration with Managed Identity&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;LI-CODE lang="sql"&gt;CREATE CREDENTIAL [MyAKV.vault.azure.net]
WITH IDENTITY = 'Managed Identity'
FOR CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM_Prov;&lt;/LI-CODE&gt;&lt;/DIV&gt;
&lt;H4&gt;How Copilot Can Help&lt;/H4&gt;
&lt;P&gt;Infrastructure Configuration&lt;/P&gt;
&lt;LI-CODE lang=""&gt; Walk me through setting up Azure Arc for SQL Server 2025 to use Managed Identity for backups to Azure Blob Storage
@mssql Generate the PowerShell commands to register my SQL Server with Azure Arc and configure RBAC for Key Vault access&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Identify Existing Credentials to Migrate&lt;/P&gt;
&lt;LI-CODE lang=""&gt; List all credentials in my SQL Server that use SHARED ACCESS SIGNATURE or contain secrets, so I can plan migration to Managed Identity&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Migration Scripts&lt;/P&gt;
&lt;LI-CODE lang=""&gt; I have backup jobs using SAS token credentials. Generate a migration script to convert them to use Managed Identity&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Troubleshooting&lt;/P&gt;
&lt;LI-CODE lang=""&gt; My backup WITH MANAGED_IDENTITY fails with "Authorization failed". What are the steps to diagnose RBAC permission issues?
@mssql The Azure Arc agent shows "Disconnected" status. How do I troubleshoot connectivity and re-register the server?&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Audit and Compliance&lt;/P&gt;
&lt;LI-CODE lang=""&gt; Generate a report showing all Azure resources my SQL Server's Managed Identity has access to, with their RBAC role assignments&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Prerequisites and Limitations&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Arc agent installed and connected SQL Server 2025, running on Windows&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/release-notes?view=sql-server-ver17" target="_blank" rel="noopener"&gt;Azure Extension for SQL Server&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Current Limitations&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Failover cluster instances isn't supported.&lt;/LI&gt;
&lt;LI&gt;Disabling not recommended&lt;/LI&gt;
&lt;LI&gt;Only system-assigned managed identities are supported&lt;/LI&gt;
&lt;LI&gt;FIDO2 method not currently supported&lt;/LI&gt;
&lt;LI&gt;Azure public cloud access required&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Documentation&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/overview?view=sql-server-ver17" target="_blank" rel="noopener"&gt;Overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/managed-identity?view=sql-server-ver17" target="_blank" rel="noopener"&gt;Managed identity overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/microsoft-entra-authentication-with-managed-identity?view=sql-server-ver17&amp;amp;tabs=portal" target="_blank" rel="noopener"&gt;Set Up Managed Identity and Microsoft Entra Authentication for SQL Server Enabled by Azure Arc&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/sql/relational-databases/security/encryption/setup-steps-for-extensible-key-management-using-the-azure-key-vault?view=sql-server-ver17&amp;amp;tabs=portal" target="_blank" rel="noopener"&gt;Set up Transparent Data Encryption (TDE) Extensible Key Management with Azure Key Vault&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 12:49:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/managed-identity-on-sql-server-on-prem-the-end-of-stored-secrets/ba-p/4496450</guid>
      <dc:creator>RyadB</dc:creator>
      <dc:date>2026-02-23T12:49:56Z</dc:date>
    </item>
    <item>
      <title>Windows Hello for Business - Registered Methods and Last-used Method</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/windows-hello-for-business-registered-methods-and-last-used/ba-p/4495717</link>
      <description>&lt;P&gt;Hi folks – Mike Hildebrand here!&amp;nbsp; Today, I bring you a short post about gaining more awareness of Windows Hello for Business (WHFB) configuration information from across your fleet of Windows PCs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Over time, we’ve improved the built-in "Authentication Methods" reporting in the Entra portal.&amp;nbsp; As far as WHFB goes, at this point, the Entra Portal provides high-level counts of WHFB registration and usage: &amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, we IT Pros are a curious bunch, always looking for &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;more&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; information and &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;more&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; detail about what’s going on in our enterprise.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A while back, after being asked by numerous customers for a way to get more details about their WHFB deployment, I&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/azure-ad-sign-in-logs--workbooks--know-who-is-using-windows-hello-for-business/2661980" target="_blank" rel="noopener"&gt;published a post&lt;/A&gt; about using Entra sign-in log data and a custom Log Analytics Workbook to obtain that information.&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That post/report has proven helpful - from Entra sign in logs, we can determine &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;who is using WHFB&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;, &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;from which device&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; (and there’s even a map to show &lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;where in the world&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt; it’s happening).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Nice.&lt;/P&gt;
&lt;P&gt;But that's only the 'cloud-side' of the situation - there are almost always two follow up questions that can only be answered from the endpoint:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;What WHFB methods has a user registered&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; on the endpoint(s)?&amp;nbsp; PIN only?&amp;nbsp; PIN + fingerprint?&amp;nbsp; Face?&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Which WHFB method was last used&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; by a given user on a given endpoint?&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Ask, and yee shall receive&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/H1&gt;
&lt;P&gt;Here are two easy/quick &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/remediations" target="_blank" rel="noopener"&gt;Intune Proactive Remediation&lt;/A&gt; detection scripts you can use that send configurations to a Windows endpoint and retrieve the local device details (via reg-values) around WH4B enrollment methods and the last-used WHFB method.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;NOTE: In my 12 days of Christmas blog-a-thon, I &lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/the-twelve-days-of-blog-mas-no-1---a-creative-use-for-intune-remediations/3992433" target="_blank" rel="noopener"&gt;posted about creative uses of Intune Proactive Remediations&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Once again, thanks to Marius Wyss and his&amp;nbsp;&lt;A href="https://github.com/MrWyss-MSFT/Intune-Remediation-Scripts/tree/main/WH4B" target="_blank" rel="noopener"&gt;core scripts to collect the WHFB registration and 'last used' info from local endpoints.&lt;/A&gt; They’re the real magic here.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class=""&gt;&lt;U&gt;&lt;STRONG&gt;!! CAUTION !!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;There is PowerShell code involved here.&amp;nbsp;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;Due diligence is required on your part.&amp;nbsp;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;Raise your right hand and read this out loud: “&lt;EM&gt;Like everything else, I will thoroughly test this and all code/changes that I work with before I deploy to production.&amp;nbsp; I will document the before-change state to ensure I can revert any changes I make&lt;/EM&gt;.”&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;U&gt;&lt;STRONG&gt;CODE DISCLAIMER&lt;/STRONG&gt;&lt;/U&gt; –&amp;nbsp;&lt;EM&gt;These sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;&lt;STRONG&gt;REMINDER/NOTE&lt;/STRONG&gt;&lt;/U&gt; - When using your scripting editing tool of choice, always be aware of any additional spaces or odd quotation marks or other issues that may result from edit/copy/paste.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&lt;STRONG&gt;&lt;EM&gt;“&lt;U&gt;Enrollment Types&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;U&gt;&lt;STRONG&gt;&lt;EM&gt;” &lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Detection&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;The ‘Enrolled Methods’ script from Marius&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://github.com/MrWyss-MSFT/Intune-Remediation-Scripts/tree/main/WH4B/Enrolled%20Methods" target="_blank" rel="noopener"&gt;Intune-Remediation-Scripts/WH4B/Enrolled Methods at main · MrWyss-MSFT/Intune-Remediation-Scripts · GitHub&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; My Remediation Script Settings:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; My results:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;“As of 2/2/2026 at 9:40 AM, Adele registered a PIN (default/required) - a face - and a fingerprint - for WH4B on the SURFACEPRO5 device”&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&lt;STRONG&gt;&lt;EM&gt;“&lt;U&gt;Last Used Method&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;U&gt;&lt;STRONG&gt;&lt;EM&gt;”&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt; Detection&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;The ‘Last Used Method’ script from Marius&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;o&amp;nbsp;&amp;nbsp; &lt;A href="https://github.com/MrWyss-MSFT/Intune-Remediation-Scripts/tree/main/WH4B/Last%20Used%20Method" target="_blank" rel="noopener"&gt;Intune-Remediation-Scripts/WH4B/Last Used Method at main · MrWyss-MSFT/Intune-Remediation-Scripts · GitHub&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; My Remediation Settings:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; My results:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;“As of 2/2/2026 at 9:40 AM, Adele last used a face/camera for WHFB on the SURFACEPRO5 device”&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Additional Examples of Results&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;Enrollment Types Registered&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;o&amp;nbsp;&amp;nbsp; NOTE: Remember, a PIN is required, so where you see ‘Fingerprint configured’ in the output, it means ‘PIN + Fingerprint’&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Last-used method&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There you have it folks - by combing these two Detection Scripts with the Log Analytics Workbook mentioned at the start of the post, you have a solid solution for ‘end to end’ WH4B reporting.&lt;/P&gt;
&lt;P&gt;Hilde&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 12:00:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/windows-hello-for-business-registered-methods-and-last-used/ba-p/4495717</guid>
      <dc:creator>MichaelHildebrand</dc:creator>
      <dc:date>2026-02-19T12:00:02Z</dc:date>
    </item>
    <item>
      <title>Check This Out! (CTO!) Guide (January 2026)</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-january-2026/ba-p/4494595</link>
      <description>&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/users/tysonpaul/322025" data-lia-auto-title="Member: TysonPaul | Microsoft Community Hub" data-lia-auto-title-active="0" target="_blank"&gt;Member: TysonPaul | Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/skills-hub-blog/from-classroom-to-workforce-helping-higher-ed-faculty-prepare-students-for-what%E2%80%99/3288783" target="_blank" rel="noopener noreferrer"&gt;From classroom to workforce: Helping higher ed faculty prepare students for what’s next&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftlearn/blog/microsoftlearnblog" target="_blank" rel="noopener noreferrer"&gt;Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/rwortmanmorris/750938" target="_blank" rel="noopener noreferrer"&gt;RWortmanMorris&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/15/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft is partnering with higher education institutions to prepare students and faculty for an AI-driven workforce. Through tools like AI Skills Navigator, Microsoft Learn for Educators, and the Microsoft Student Ambassadors program, they offer free, flexible training, credentials, and community support to develop practical AI and digital skills. These initiatives help faculty integrate AI into teaching, empower students with job-ready skills, and provide recognized certifications valued by employers. Microsoft also provides free access to Microsoft 365 and LinkedIn Premium, aiming to support lifelong learning, teaching innovation, and successful career pathways in the evolving educational landscape.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuremigrationblog/azure-arc-portal-update-simplifying-onboarding-and-management-at-scale/4477355" target="_blank" rel="noopener noreferrer"&gt;Azure Arc Portal Update: Simplifying Onboarding and Management at Scale&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuremigrationblog" target="_blank" rel="noopener noreferrer"&gt;Azure Migration and Modernization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/marcob/2856803" target="_blank" rel="noopener noreferrer"&gt;MarcoB&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/16/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The updated Azure Arc portal streamlines onboarding and management of hybrid and multi-cloud resources. Key improvements include a redesigned landing page, guided onboarding via interactive questionnaires, and unified machine onboarding flows for greater simplicity. Navigation is reorganized for better clarity, and dashboards now offer adaptive summaries and actionable insights, transforming management tasks into intuitive actions. These enhancements aim to make Azure Arc more accessible and scalable, enabling users to efficiently manage external resources and focus on delivering business value instead of dealing with complexity.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/resolve-dnsname-vs-nslookup-in-windows/4483858" target="_blank" rel="noopener noreferrer"&gt;Resolve-DnsName vs. nslookup in Windows&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/networkingblog" target="_blank" rel="noopener noreferrer"&gt;Networking&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/jameskehr/286900" target="_blank" rel="noopener noreferrer"&gt;JamesKehr&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/08/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article compares nslookup and Resolve-DnsName for DNS troubleshooting in Windows. Nslookup is widely used but operates independently of Windows DNS client resolver, potentially causing inaccurate results due to quirks like DNS suffix handling and lack of support for modern DNS features. Resolve-DnsName, a PowerShell cmdlet, integrates with Windows DNS-CR, providing accurate results, support for DNSSEC, secure DNS, and flexible parameters. For Windows-centric troubleshooting and automation, Resolve-DnsName is recommended, while nslookup remains useful for basic queries and diagnosing DNS client issues. Understanding their differences ensures reliable DNS troubleshooting.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurenetworkingblog/data-center-quantized-congestion-notification-scaling-congestion-control-for-roc/4468417" target="_blank" rel="noopener noreferrer"&gt;Data Center Quantized Congestion Notification: Scaling congestion control for RoCE RDMA in Azure&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurenetworkingblog" target="_blank" rel="noopener noreferrer"&gt;Azure Networking&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/vamsivadlamuri/2035323" target="_blank" rel="noopener noreferrer"&gt;VamsiVadlamuri&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/13/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft Azure uses Data Center Quantized Congestion Notification (DCQCN) to enable high-throughput, low-latency RDMA-based storage across its global data centers. DCQCN, combined with Priority Flow Control, dynamically manages congestion using ECN-based feedback, ensuring reliable performance even with diverse hardware and network conditions. Azure addressed interoperability challenges between NIC generations by tuning DCQCN parameters and optimizing feedback mechanisms. As a result, Azure achieves line-rate RDMA performance, significant CPU savings, reduced latency, and near-zero packet loss, making DCQCN essential for scalable and resilient cloud storage infrastructure.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/askds/what-is-going-on-with-rc4-in-kerberos/4489365" target="_blank" rel="noopener noreferrer"&gt;What is going on with RC4 in Kerberos?&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/windows-server/blog/askds" target="_blank" rel="noopener noreferrer"&gt;Ask the Directory Services Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/willaftring/430880" target="_blank" rel="noopener noreferrer"&gt;WillAftring&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft is phasing out RC4 usage in Kerberos authentication due to security concerns, with major changes starting in January 2026. RC4 will be removed as a default encryption type, and new auditing tools will help identify dependencies. Enforcement begins April 2026, with rollback options until July 2026. While DES is already removed, RC4 remains supported for critical legacy needs if properly configured. Microsoft encourages users to migrate away from RC4 and offers resources and support for environments still dependent on it.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurepaasblog/redis-keys-statistics/4486079" target="_blank" rel="noopener noreferrer"&gt;Redis Keys Statistics&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurepaasblog" target="_blank" rel="noopener noreferrer"&gt;Azure PaaS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/luisfilipe/741199" target="_blank" rel="noopener noreferrer"&gt;LuisFilipe&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/21/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article explains how to gather Redis key statistics, focusing on Time-to-Live (TTL) and key size, to troubleshoot cache usage and performance. It provides two Bash+LUA script solutions: one for key statistics (counting keys by TTL and size thresholds), and another for listing key names meeting specified TTL and size criteria. The article highlights the importance of managing TTL and key sizes for optimal Redis performance and warns that running these scripts can impact Redis workloads due to their need to scan all keys. Usage instructions, parameters, and performance considerations are detailed.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearcblog/azure-arc-server-jan-2026-forum-recap/4487829" target="_blank" rel="noopener noreferrer"&gt;Azure Arc Server Jan 2026 Forum Recap&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearcblog" target="_blank" rel="noopener noreferrer"&gt;Azure Arc&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/aurnov_chattopadhyay/1321258" target="_blank" rel="noopener noreferrer"&gt;Aurnov_Chattopadhyay&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/20/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The January 2026 Azure Arc Server Forum highlighted new machine management features in Azure Compute Hub, updates on Windows Server Hot Patch and its billing, a preview of TPM-based onboarding to Azure Arc, and a recap of major 2025 SQL Server announcements. Attendees are encouraged to stay updated with the latest Arc agent, provide feedback, and register for SQL Con 2026. The session’s recording is available on YouTube, and registration for future forums and newsletters is open, with the next session scheduled for February 19, 2026.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/azure-file-sync-azure-arc-integration-additional-regions-and-secure-syncing/4486050" target="_blank" rel="noopener noreferrer"&gt;Azure File Sync: Azure Arc Integration, Additional Regions, and Secure Syncing&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurestorageblog" target="_blank" rel="noopener noreferrer"&gt;Azure Storage&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/grace_kim/2977581" target="_blank" rel="noopener noreferrer"&gt;grace_kim&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/16/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Azure File Sync now integrates with Azure Arc, enabling simplified deployment and management of hybrid file services. The service expands to four new regions—Italy North, New Zealand North, Poland Central, and Spain Central—offering improved regional data residency and performance. Enhanced security is provided through managed identities, eliminating the need for manual credential management. From January 2026, File Sync will incur no per-server cost for Windows Server Software Assurance customers using Azure Arc and File Sync agent v22+. These updates streamline onboarding, ensure secure access, and support scalable, predictable hybrid storage solutions.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurestorageblog/announcing-public-preview-of-user-delegation-sas-for-azure-tables-azure-files-an/4485693" target="_blank" rel="noopener noreferrer"&gt;Announcing Public Preview of User delegation SAS for Azure Tables, Azure Files, and Azure Queues&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurestorageblog" target="_blank" rel="noopener noreferrer"&gt;Azure Storage&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ellievail/3335667" target="_blank" rel="noopener noreferrer"&gt;ellievail&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/16/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has announced the public preview of user delegation SAS (UD SAS) for Azure Tables, Azure Files, and Azure Queues in all regions, expanding secure access beyond Azure Blobs. UD SAS ties SAS tokens to user identities via Entra ID and RBAC, enabling more granular, delegated access to storage resources. There’s no additional cost, and it’s available through REST APIs, SDKs, PowerShell, and CLI. Eligible storage accounts can use UD SAS without special settings, and setup involves assigning RBAC roles, obtaining a user delegation key, creating the SAS token, and sharing it securely.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/deploy-postgresql-on-azure-vms-with-azure-netapp-files-production-ready-infrastr/4486114" target="_blank" rel="noopener noreferrer"&gt;Deploy PostgreSQL on Azure VMs with Azure NetApp Files: Production-Ready Infrastructure as Code&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearchitectureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/geertvanteylingen/222853" target="_blank" rel="noopener noreferrer"&gt;GeertVanTeylingen&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/15/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article details how deploying PostgreSQL on Azure VMs with Azure NetApp Files is simplified using production-ready Infrastructure as Code (IaC) templates. These templates automate setup, optimize storage performance, and enhance security, eliminating manual configuration and reducing deployment time from hours to minutes. Teams can use Terraform, ARM templates, or PowerShell for flexible, repeatable workflows across development and production environments. Key benefits include consistent environments, enterprise-grade features, rapid provisioning, cost efficiency, and support for AI/ML workloads and database migrations. The solution ensures scalable, secure, and high-performance PostgreSQL deployments on Azure.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/unlocking-advanced-data-analytics--ai-with-azure-netapp-files-object-rest-api/4486098" target="_blank" rel="noopener noreferrer"&gt;Unlocking Advanced Data Analytics &amp;amp; AI with Azure NetApp Files object REST API&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurearchitectureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/geertvanteylingen/222853" target="_blank" rel="noopener noreferrer"&gt;GeertVanTeylingen&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/15/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article details how the Azure NetApp Files object REST API enables S3-compatible object access to enterprise file data stored on Azure NetApp Files, eliminating the need for data copying or restructuring. This dual-access approach allows analytics and AI platforms, including Azure Databricks and Microsoft OneLake, to operate directly on NFS/SMB datasets, preserving performance, security, and governance. Integration scenarios, technical implementation, and video guides are provided to help organizations streamline data architectures, minimize data movement, and accelerate real-time insights across analytics and AI workflows.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAABLCAMAAAAPkIrYAAAAAXNSR0IB2cksfwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAHtQTFRFAAAA8lAi8lAi8lAi8lAif7oAf7oAf7oAf7oA8lAi8lAi8lAif7oAf7oAf7oA8lAi8lAif7oAf7oA8lAif7oAAaTvAaTvAaTvAaTv/7kB/7kB/7kB/7kBAaTvAaTvAaTv/7kB/7kB/7kBAaTvAaTv/7kB/7kBAaTv/7kBfMz9mwAAACl0Uk5TADt7ag4Oans7/90eHt3/wBoawAMDDh4aAwMaHg5q3cDA3Wp7//97OzspjeVtAAAAlElEQVR4nO3WqwqAQBSEYY+uWiyCBm/J4Pu/jRhMBi8IFsHLCoZ9gCkbRGby8OVfHHuTD1sCQBHtw89hLDdE1h4h6zxp0aJFixYtWrT+bXnA8mWL5QbWZSyFLG9NHmTd9hszhY05ZrAxB2NVsEWnPECf3lg1+F3HXAQKWB0tWrRo0aJFi9a/rUYjaymR5bb2G/OL1guM9e5M8yBd4gAAAABJRU5ErkJggg==" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azuretoolsblog/release-of-bicep-azure-verified-modules-for-platform-landing-zone/4487932" target="_blank" rel="noopener noreferrer"&gt;Release of Bicep Azure Verified Modules for Platform Landing Zone&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azuretoolsblog" target="_blank" rel="noopener noreferrer"&gt;Azure Tools&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/ztrocinski/2252387" target="_blank" rel="noopener noreferrer"&gt;ztrocinski&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/20/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; **Summary:** Microsoft has released Azure Verified Modules (AVM) for Platform Landing Zones using Bicep, providing a modular, customizable, and officially supported approach to Infrastructure as Code (IaC). The framework features 19 independently managed modules, supports full configuration, and integrates Azure Deployment Stacks for improved resource lifecycle management. Bicep AVM replaces classic ALZ-Bicep, which will be deprecated by 2027. Key benefits include end-to-end customization, faster innovation, independent policy management, and modernized parameter files, making Azure deployments more flexible, maintainable, and aligned with enterprise best practices. Migration guidance will be provided for existing users.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/improving-efficiency-through-adaptive-cpu-uncore-power-management/4486456" target="_blank" rel="noopener noreferrer"&gt;Improving Efficiency through Adaptive CPU Uncore Power Management&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurecompute" target="_blank" rel="noopener noreferrer"&gt;Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/pulkitmisra/3207934" target="_blank" rel="noopener noreferrer"&gt;PulkitMisra&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/21/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article discusses Microsoft Azure’s adoption of adaptive CPU uncore power management, focusing on Efficiency Latency Control (ELC) co-designed with Intel for Xeon 6 processors. ELC enables dynamic adjustment of uncore frequency based on CPU utilization, improving power efficiency without sacrificing performance. Real-world tests show up to 11% power savings at moderate loads and 1.5× performance-per-watt improvements at low loads. This approach allows Azure to deploy more servers within existing datacenter power constraints, enhancing sustainability and responsiveness to evolving cloud workload demands through hardware–software co-design.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurecompute/announcing-general-availability-of-azure-daeafasv7-series-vms-based-on-amd-%E2%80%98turi/4488627" target="_blank" rel="noopener noreferrer"&gt;Announcing General Availability of Azure Da/Ea/Fasv7-series VMs based on AMD ‘Turin’ processors&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurecompute" target="_blank" rel="noopener noreferrer"&gt;Azure Compute&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/arpitachatterjee/1766582" target="_blank" rel="noopener noreferrer"&gt;ArpitaChatterjee&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/27/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft has announced the general availability of Azure’s new AMD-based Da/Ea/Fasv7-series Virtual Machines powered by 5th Gen AMD EPYC ‘Turin’ processors. These VMs offer improved CPU performance, scalability, memory capacity, network, and storage throughput, with up to 35% better price-performance than previous AMD v6 VMs. They cater to diverse workloads, including general, memory, and compute-intensive tasks, and feature enhanced security and flexible configurations. Available across multiple Azure regions, these VMs deliver significant workload-specific gains and are praised by customers and technology partners for performance and efficiency improvements.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/determine-defender-for-endpoint-offboarding-state-for-linux-devices/4488207" target="_blank" rel="noopener noreferrer"&gt;Determine Defender for Endpoint offboarding state for Linux devices&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/cis/blog/coreinfrastructureandsecurityblog" target="_blank" rel="noopener noreferrer"&gt;Core Infrastructure and Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/edgarus71/1595015" target="_blank" rel="noopener noreferrer"&gt;edgarus71&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/21/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article describes a method for quickly determining the Microsoft Defender for Endpoint onboarding or offboarding state on Linux devices. Since the Defender portal can take up to 7 days to update offboarding status, a provided Bash script checks key indicators such as the onboarding file, Defender package installation, and service status. The script outputs whether the device is "ONBOARDED" or "OFFBOARDED," streamlining endpoint management and troubleshooting. It can be deployed at scale via Linux management tools and also run remotely from the Live Response console for onboarded devices.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/conditional-access-for-agent-identities-in-microsoft-entra/4489915" target="_blank" rel="noopener noreferrer"&gt;Conditional Access for Agent Identities in Microsoft Entra&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/cis/blog/coreinfrastructureandsecurityblog" target="_blank" rel="noopener noreferrer"&gt;Core Infrastructure and Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/farooque/844308" target="_blank" rel="noopener noreferrer"&gt;Farooque&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/27/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Microsoft Entra introduces Agent Identities for AI systems and extends Conditional Access to them, but with limited controls compared to human users. Currently, Conditional Access only allows blocking agent identities and assessing agent risk during token acquisition, without supporting MFA, device compliance, or session controls. This is due to agents’ machine-driven authentication methods. Despite limitations, Conditional Access helps prevent compromised agents, enforce separation of duties, and manage AI sprawl. Agent Blueprints are not governed by Conditional Access. Future enhancements are expected, but for now, CA remains a minimal, identity-focused security layer for AI agents.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurehighperformancecomputingblog/announcing-azure-cyclecloud-workspace-for-slurm-version-2025-12-01-release/4481953" target="_blank" rel="noopener noreferrer"&gt;Announcing Azure CycleCloud Workspace for Slurm: Version 2025.12.01 Release&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurehighperformancecomputingblog" target="_blank" rel="noopener noreferrer"&gt;Azure High Performance Computing (HPC)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/xpillons/363564" target="_blank" rel="noopener noreferrer"&gt;xpillons&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/07/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The 2025.12.01 release of Azure CycleCloud Workspace for Slurm introduces integrated Prometheus monitoring with managed Grafana dashboards, Entra ID Single Sign-On for secure authentication, support for ARM64 compute nodes, and compatibility with Ubuntu 24.04 and AlmaLinux 9. These enhancements streamline HPC cluster management, improve security, and offer real-time performance insights, empowering technical teams to build scalable and efficient environments. The update simplifies monitoring setup and user access, reinforcing Azure’s commitment to flexible, secure, and innovative HPC solutions for scientific and technical communities.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azurehighperformancecomputingblog/scaling-physics-based-digital-twins-neural-concept-on-azure-delivers-a-new-recor/4483403" target="_blank" rel="noopener noreferrer"&gt;Scaling physics-based digital twins: Neural Concept on Azure delivers a New Record in Industrial AI&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azurehighperformancecomputingblog" target="_blank" rel="noopener noreferrer"&gt;Azure High Performance Computing (HPC)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/lmiroslaw/478706" target="_blank" rel="noopener noreferrer"&gt;lmiroslaw&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/12/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Neural Concept, leveraging Azure HPC infrastructure, achieved record-breaking accuracy and efficiency in automotive aerodynamic predictions using MIT’s DrivAerNet++ dataset. Their geometry-native Geometric Regressor outperformed all previous methods in predicting surface pressure, wall shear stress, velocity fields, and drag coefficients. The workflow transformed 39TB of CFD data into a production-ready model within a week, enabling real-time predictions and significantly shortening design cycles. Customers have realized up to 30% faster development and $20M savings per 100,000 vehicles. This demonstrates the industrial impact of scalable, AI-driven engineering workflows in automotive design.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-my-macs-accelerating-macos-proof-of-concepts-with-microsoft-intune/4488571" target="_blank" rel="noopener noreferrer"&gt;Intune my Macs: Accelerating macOS proof of concepts with Microsoft Intune&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/microsoftintune/blog/intunecustomersuccess" target="_blank" rel="noopener noreferrer"&gt;Intune Customer Success&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/intune_support_team/226779" target="_blank" rel="noopener noreferrer"&gt;Intune_Support_Team&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/22/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Intune my Macs is an open-source starter kit from Microsoft that streamlines macOS management proof of concepts using Intune. It deploys over 31 recommended enterprise configurations—including security, compliance, identity, and applications—via a single PowerShell script, operating in dry-run mode by default. The project helps organizations quickly evaluate and implement Intune for macOS, offers practical configuration examples, reduces setup time to minutes, and includes documentation and analysis tools. It’s ideal for learning, testing, and customizing Intune policies for macOS environments, saving significant time and effort.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/silicon-to-systems-how-microsoft-engineers-ai-infrastructure-from-the-ground-up/4489525" target="_blank" rel="noopener noreferrer"&gt;Silicon to Systems: How Microsoft Engineers AI Infrastructure from the Ground Up&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azureinfrastructureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Infrastructure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/alistair_speirs/72" target="_blank" rel="noopener noreferrer"&gt;Alistair_Speirs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/27/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; The article details how Microsoft engineers its AI infrastructure by designing custom silicon, servers, accelerators, and data centers as an integrated system optimized for performance, power efficiency, and cost. Highlighting custom chips like Cobalt 200 and the Maia AI Accelerator platform, Microsoft emphasizes purpose-built hardware, advanced cooling solutions, and end-to-end system integration. This approach ensures reliable, efficient AI workloads at global scale, powering services like Copilot and Teams. The engineering process involves close coordination between hardware and software development, from silicon design to datacenter deployment, prioritizing power and thermal management throughout.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;
&lt;DIV class="card"&gt;
&lt;H2&gt;&lt;A href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/deep-dive-into-the-maia-200-architecture/4489312" target="_blank" rel="noopener noreferrer"&gt;Deep dive into the Maia 200 architecture&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Team Blog:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/category/azure/blog/azureinfrastructureblog" target="_blank" rel="noopener noreferrer"&gt;Azure Infrastructure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Author:&lt;/STRONG&gt; &lt;A href="https://techcommunity.microsoft.com/users/sdighe/2775573" target="_blank" rel="noopener noreferrer"&gt;sdighe&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Published:&lt;/STRONG&gt; 01/26/2026&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt; Maia 200 is Microsoft’s first custom AI inference accelerator, designed for efficiency and scalability in Azure. It features advanced silicon, memory hierarchy, and data movement architecture, delivering 30% better performance per dollar than previous hardware. Optimized for narrow precision arithmetic and large language models, Maia 200 supports high-throughput, low-latency inference, and integrates seamlessly with Azure’s cloud infrastructure and developer tools. Its innovative interconnect and software stack enable reliable, scalable multi-tenant AI deployments, powering workloads like GPT-5.2 in Microsoft Foundry and 365 Copilot. Maia 200 sets a new standard for cloud-native, cost-effective AI inference.&lt;/P&gt;
&lt;IMG style="max-width: 10%; height: auto;" src="data:image/jpeg;base64,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" alt="Embedded Image" /&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 12 Feb 2026 14:54:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-january-2026/ba-p/4494595</guid>
      <dc:creator>TysonPaul</dc:creator>
      <dc:date>2026-02-12T14:54:34Z</dc:date>
    </item>
    <item>
      <title>Implementing Azure Lighthouse: A Technical Guide for Service Providers and Enterprises</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/implementing-azure-lighthouse-a-technical-guide-for-service/ba-p/4490592</link>
      <description>&lt;P&gt;Managing resources across multiple tenants is a common challenge for managed service providers (MSPs) and large enterprises. There are many scenarios where you may need to manage resources in many tenants, whether those tenants belong to your organization or they belong to your customers. Without a unified approach, administrators must create accounts in each customer tenant or rely on guest identities, which increases credential sprawl and makes it hard to enforce consistent governance. This also doesn’t scale, as an administrator who needs to manage many customers would need to separately login to each customer tenant in order to view and work on subscription resources across tenants. This is cumbersome and time consuming. Without a delegated access model such as Azure Lighthouse, this is how most organizations manage resources across tenants. While the focus of this article is Azure Lighthouse, there are other delegated access models available which I will compare further below.&lt;/P&gt;
&lt;img&gt;Figure 1: Access subscriptions across Entra tenants using guest login.&lt;/img&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-clear-both"&gt;Microsoft’s &lt;STRONG&gt;Azure Lighthouse&lt;/STRONG&gt; addresses the challenge of managing resources across tenants at scale by allowing service providers and customers to delegate access to specific scopes in the customer’s tenant. Users sign in to their own tenant and manage delegated resources across all customers through a &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/architecture#logical-projection" target="_blank" rel="noopener"&gt;logical projection&lt;/A&gt; model. These subscriptions appear as if they are in the service providers’ tenant and they no longer have to login to each separate tenant. This article introduces the core architecture and operational model of Azure Lighthouse and provides guidance for implementers along with lesser-known tips to help you succeed.&lt;/P&gt;
&lt;img&gt;Figure 2: Access subscriptions across Entra tenants using Azure Lighthouse, with your member login account in the Service Provider tenant.&lt;/img&gt;
&lt;P&gt;For clarity and simplicity, this article uses variations of two consistent terms. The &lt;STRONG&gt;Service Provider&lt;/STRONG&gt; refers to the managing entity, or the tenant that contains the identities used to manage resources in another tenant. The &lt;STRONG&gt;Customer&lt;/STRONG&gt; refers to the entity whose resources are being managed. Accordingly, the tenant hosting those managed resources is referred to as the &lt;STRONG&gt;Customer Tenant&lt;/STRONG&gt;, while the tenant hosting the managing identities is the &lt;STRONG&gt;Service Provider Tenant&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;Understanding Azure Lighthouse&lt;/H2&gt;
&lt;P&gt;Azure Lighthouse isn’t a separate management portal, it’s a set of delegated resource management capabilities that operate through Azure Resource Manager (ARM) and the Azure portal. When a customer delegates a subscription or resource group, two resources are created in the customer tenant:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/architecture#registration-definition" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Registration definition&lt;/STRONG&gt;&lt;/A&gt; – describes the managing tenant, the built-in role assignments (principal IDs + roles) and metadata for the managed service offer. One definition exists per subscription.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/architecture#registration-assignment" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Registration assignment&lt;/STRONG&gt;&lt;/A&gt; – binds the registration definition to a specific scope (subscription or resource group).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Azure Resource Manager verifies the presence of these two resources when a user in the service provider’s tenant performs an operation on customer resources. The customer’s resources are &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/architecture#logical-projection" target="_blank" rel="noopener"&gt;&lt;EM&gt;logically projected&lt;/EM&gt;&lt;/A&gt; into the managing tenant, so users can stay signed in to their own tenant and still manage delegated resources without switching directories. All activity performed by managing-tenant users is logged in the customer’s activity log, enabling accountability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Onboarding Customers to Azure Lighthouse Methods&lt;/H2&gt;
&lt;P&gt;There are two supported &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/how-to/onboard-customer?tabs=azure-portal" target="_blank" rel="noopener"&gt;onboarding&lt;/A&gt; methods:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;ARM template deployment&lt;/STRONG&gt; – The service provider creates a JSON template specifying the managedByTenantId (the provider’s tenant), an &lt;EM&gt;authorizations&lt;/EM&gt; array containing principal IDs and built-in role IDs, and optional metadata (offer name/description). The provider then delivers the template to the customer, who deploys it into their subscription or resource group. You must know the customer’s tenant ID and subscription ID (or resource group names) and the provider’s tenant ID. Each authorization requires the principal ID (user, group or service principal) and the built-in role definition ID.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Managed service offer via Azure Marketplace&lt;/STRONG&gt; – Partners who meet competency requirements can &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/how-to/publish-managed-services-offers" target="_blank" rel="noopener"&gt;publish public or private offers&lt;/A&gt; in the Azure Marketplace. Customers accept the offer via the Marketplace, which automatically deploys the registration definition and assignment into their tenant. Offers apply identically across all purchasers. To customize roles for specific customers, you must publish separate private offers or use the ARM template method.&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Figure 3: Workflow for onboarding Azure Lighthouse using either the Azure Marketplace or an ARM template.&lt;/img&gt;
&lt;P&gt;Once deployed, these resources produce a logical projection of the delegated subscriptions/resource groups.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scope and Role Considerations&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Tenant and subscription IDs&lt;/STRONG&gt; – When deploying via ARM, you must know the tenant ID of both the service provider and the customer, plus the subscription ID(s) or resource group names you intend to onboard.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Role definitions&lt;/STRONG&gt; – Any Azure built-in role &lt;EM&gt;except&lt;/EM&gt; Owner is supported; custom roles and classic administrator roles are not supported. Roles containing DataActions (e.g., storage listKeys) or certain Microsoft.Authorization actions aren’t allowed. Always assign roles that follow the principle of least privilege; for example, use Reader for monitoring tasks, Contributor for VM management or custom roles where data access isn’t needed. Assigning the &lt;STRONG&gt;Managed Services Registration Assignment Delete Role&lt;/STRONG&gt; is recommended so that service-provider users can remove their own access later.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Group vs. individual assignments&lt;/STRONG&gt; – It’s best practice to assign permissions to Microsoft Entra security groups or service principals rather than individual users. This allows you to add or remove users without redeploying the delegation and simplifies the management of large teams. Ensure the group type is set to &lt;STRONG&gt;Security&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Eligible authorizations (just-in-time)&lt;/STRONG&gt; – Azure Lighthouse supports Azure Privileged Identity Management (PIM). You can create &lt;STRONG&gt;eligible&lt;/STRONG&gt; authorizations that require users to activate their role for a defined duration (up to eight hours) and optionally require approval or multi-factor authentication. This model reduces the number of permanent privileged assignments.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Working with Delegated Resources&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Navigating the Azure Portal&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Service providers &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/how-to/view-manage-customers" target="_blank" rel="noopener"&gt;manage delegated tenants through the &lt;STRONG&gt;My customers&lt;/STRONG&gt;&lt;/A&gt; blade in the Azure portal. Users must have at least the &lt;EM&gt;Reader&lt;/EM&gt; role to access this view. From &lt;STRONG&gt;My customers&lt;/STRONG&gt;, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;View all customers that have delegated subscriptions or resource groups to your tenant.&lt;/LI&gt;
&lt;LI&gt;Inspect customer details, offers and delegations; drill down to see which subscriptions or resource groups have been delegated and which roles are assigned.&lt;/LI&gt;
&lt;LI&gt;Review delegation change activity; the activity log lists every delegation and removal (requires Monitoring Reader at root scope).&lt;/LI&gt;
&lt;LI&gt;Remove delegations – If the delegation was created with the &lt;EM&gt;Managed Services Registration Assignment Delete Role&lt;/EM&gt;, your users can revoke their own access via the trash-can icon; otherwise, only the customer can remove the delegation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Within other Azure services, you can work directly in the context of a delegated subscription. Use the &lt;STRONG&gt;Directories + subscriptions&lt;/STRONG&gt; filter to choose delegated subscriptions and resource groups (turn off &lt;EM&gt;Advanced filters&lt;/EM&gt;) and set them as your default scope. The portal will automatically scope your operations (e.g., creating VMs, assigning policies) to the selected delegated subscription.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;CLI and API Support&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;All Azure Resource Manager APIs and management tools (Azure CLI, Azure PowerShell, Terraform, etc.) work with delegated resources. Use Get-AzSubscription in PowerShell or az account list in CLI to list your subscriptions; these commands include homeTenantId and managedByTenantIds fields to differentiate between your own and delegated subscriptions. If you do not see these fields, run az account clear then log in again.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cross-Tenant Scenarios and Services&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Azure Lighthouse enables &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/cross-tenant-management-experience#enhanced-services-and-scenarios" target="_blank" rel="noopener"&gt;cross-tenant management across many services&lt;/A&gt; as long as the user has the appropriate role. Example scenarios include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Arc&lt;/STRONG&gt; – Onboard servers, Kubernetes clusters and SQL resources outside Azure into delegated subscriptions; enforce consistent policy and use GitOps across customers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Backup&lt;/STRONG&gt; – View and manage backups across delegated subscriptions. Backup center and Backup Explorer provide aggregated views for delegated resources.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Automation / Functions&lt;/STRONG&gt; – Use automation accounts or serverless functions in your tenant to run tasks against delegated resources.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cost Management&lt;/STRONG&gt; – CSP partners can view consumption costs (pre-tax, retail rates) for delegated subscriptions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Key Vault and Kubernetes&lt;/STRONG&gt; – Create Key Vaults in customer tenants and manage AKS clusters; monitor container performance across customer tenants.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These services reflect only a subset of supported capabilities; most ARM-based operations will work cross tenant.&lt;/P&gt;
&lt;H2&gt;Security and Governance Best Practices&lt;/H2&gt;
&lt;P&gt;Implementing Azure Lighthouse is not just about technology; it requires strong governance:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Require multi-factor authentication (MFA)&lt;/STRONG&gt; – Users in your managing tenant should always be subject to Microsoft Entra MFA. Encourage customers to do the same.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Conditional Access Policies: &lt;/STRONG&gt;Conditional access policies defined in the customer tenant &lt;EM&gt;do not apply&lt;/EM&gt; to delegated users; only the managing tenant’s policies are enforced. For example, it would be wrong for a customer to assume that if they enforce an MFA conditional access policy, that a delegated user from the service providers tenant would be forced to use MFA when accessing customer resources. MFA would need to be enforced in the service providers tenant to ensure that delegated users would access the customer resources with MFA.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Principle of least privilege&lt;/STRONG&gt; – Use Azure RBAC roles with the minimum permissions necessary. Limit the number of users with high privileges and regularly review memberships.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use groups / service principals&lt;/STRONG&gt; – Assign roles to security groups or service principals instead of individuals; this simplifies management when people join or leave your team.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Assign the Registration Assignment Delete role&lt;/STRONG&gt; – Always include the built-in &lt;STRONG&gt;Managed Services Registration Assignment Delete Role&lt;/STRONG&gt; in your authorizations so that your users can remove their own access without customer intervention.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Understand role limitations&lt;/STRONG&gt; – The Owner role isn’t supported; neither are roles with DataActions permissions (e.g., retrieving storage account keys). Roles with specific Microsoft.Authorization actions are also not allowed.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor activity and use logs&lt;/STRONG&gt; – The customer’s activity log records all write and action operations performed by delegated users. Encourage customers to review these logs and ensure compliance.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Opt for eligible authorizations&lt;/STRONG&gt; – Where practical, use Azure PIM to create eligible authorizations for just-in-time elevation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Pay attention to subscription transfers&lt;/STRONG&gt; – If a delegated subscription is transferred to another Microsoft Entra tenant, the registration definition and assignment remain so long as the &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/tenants-users-roles#transferring-delegated-subscriptions-between-microsoft-entra-tenants" target="_blank" rel="noopener"&gt;subscription hasn’t been delegated to that tenant before&lt;/A&gt;. If it has, the delegation resources for that tenant are removed and access via Azure Lighthouse stops.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Comparing Delegation and Packaging Models&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Lighthouse&lt;/STRONG&gt;, &lt;STRONG&gt;Administer on behalf of (AOBO)&lt;/STRONG&gt;, and &lt;STRONG&gt;Azure Managed Applications&lt;/STRONG&gt; are all Azure delegation models that enable one organization to manage resources owned by another without fully transferring ownership. Each is designed to support scenarios where a service provider, partner, or central IT team needs some level of administrative control over customer or business unit subscriptions. They share a common goal of simplifying operations while maintaining separation between the managing party and the resource owner. However, they differ substantially in how access is granted, how permissions are scoped and enforced, and whether the focus is ongoing environment administration or tightly controlled application management. Understanding these differences is essential for choosing the right model for governance, security, and scale.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure Lighthouse is designed for cross-tenant, large-scale management, allowing a service provider or central IT team to manage multiple customer or internal tenants through Azure RBAC-based delegation without adding guest accounts; permissions are explicit, least-privilege, auditable, and can span subscriptions, resource groups, or management groups. AOBO is an older, Commerce-era mechanism primarily tied to CSP subscriptions that allows partners to administer customer subscriptions, but it relies on broad, often implicit permissions and Entra ID guest access, lacks fine-grained RBAC control, and does not scale well for modern governance scenarios. Azure Managed Applications, by contrast, focus on application lifecycle control rather than general administration: they allow a publisher to deploy and manage specific Azure resources on a customer’s behalf while the customer retains ownership, with access restricted to only the managed resource group defined by the application.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Architectural differences&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AOBO&lt;/STRONG&gt; – The provider logs in as a guest into the customer’s Azure&amp;nbsp;AD tenant and is assigned RBAC roles manually. The provider must switch directories to operate within each customer’s environment.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure&amp;nbsp;Lighthouse&lt;/STRONG&gt; – Delegated assignments are created at the ARM control plane. No guest accounts are needed; the provider uses its own Microsoft Entra tenant and can see delegated subscriptions under My&amp;nbsp;customers.&amp;nbsp; The customer remains in full control and can remove the delegation at any time.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure&amp;nbsp;Managed Applications&lt;/STRONG&gt; – The provider packages an entire solution into an ARM template and publishes it privately or publicly via a service catalog or marketplace. When deployed, Azure creates a managed resource group in the customer’s subscription.&amp;nbsp; That resource group is hidden from the customer; only an application resource and configurable parameters are exposed.&amp;nbsp; The provider automatically receives owner access on the managed resource group to operate the solution&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Access and control&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AOBO&lt;/STRONG&gt; – Access is granted via individual RBAC assignments to guest users. Providers juggle multiple customer tenants and must maintain least privilege manually.&amp;nbsp; Customers must remove each role assignment if they want to revoke access to services.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure&amp;nbsp;Lighthouse&lt;/STRONG&gt; – Access is granted via delegated roles defined in an offer or through portal‑based delegation. Providers work under their own tenant context, and customers can revoke the entire delegation in one action.&amp;nbsp; Operations by the provider are logged in the customer’s activity logs and are subject to the customer’s policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Azure Managed Applications&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; – Access is tied to the managed resource group; Management is done in the provider tenant and not the customer tenant. Customers cannot see underlying resources or modify them directly.&amp;nbsp; Providers control the life‑cycle of the solution (deployment, updates, operations).&amp;nbsp; Customers interact with the application through exposed parameters and can remove it by deleting the application resource, which cleans up the managed resource group.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Figure 4: Example of delegation methods.&lt;/img&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-16" border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;AOBO&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Azure&amp;nbsp;Lighthouse&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Azure&amp;nbsp;Managed Applications&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Access model&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Guest accounts with manual role assignments in the customer tenant; cross‑tenant administration is done via individual RBAC assignments.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Delegated resource management assignments created at the control plane through ARM; provider uses its own tenant identity.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;ARM templates package resources into a managed resource group; provider gets owner access to that group via the Managed Application’s authorization definition.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Scalability&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Manual; each tenant must assign roles per provider user; difficult to scale across many customers.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;High; one offer can onboard many customers and delegated scopes appear automatically in the provider portal.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Scalable for packaging repeatable solutions; each deployment creates its own managed resource group but does not provide cross‑tenant visibility.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Governance&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Hard to enforce least privilege; guest users may accumulate high‑privilege roles and require per‑user, per‑subscription revocation.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Strong governance; customers can remove the entire delegation with one action and providers request only the roles they need.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Provider controls a hidden managed resource group; customers have limited oversight but can delete the application to remove the solution.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Identity management&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Providers manage multiple guest accounts and switch Azure&amp;nbsp;AD directories.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Providers remain in their own Azure&amp;nbsp;AD tenant; no guest accounts; context switching is eliminated.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Providers operate via a service principal with owner access on the managed resource group; customers interact via an application resource.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Billing / commerce&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;None; AOBO is purely an access model with no built‑in billing.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Can be combined with private or Marketplace plans for management services.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Pricing defined in the Marketplace or service catalog; supports usage‑based or flat‑rate charges for the packaged solution.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Historical mechanism for delegated admin in partner programs; largely superseded by Lighthouse.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Delegate access to existing resources across tenants for operations such as monitoring, compliance and support.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Deliver packaged solutions to run in the customer’s subscription as a managed service under provider control.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Resource location&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Existing resources remain in the customer’s subscription; no separate resource groups created.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Existing resources remain in the customer’s subscription; no new resource groups are created by the delegation.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Resources are deployed into a dedicated managed resource group that is hidden from the customer.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Customer control&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;The customer holds full control but must revoke individual role assignments; risk of lingering privileges.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;The customer retains full visibility and can revoke the entire delegation at any time.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;The customer’s control is limited to application parameters; underlying resources are hidden but can be removed by deleting the application.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Provider control&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Provider’s access depends on assigned roles; may result in over‑privileged guest users.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Provider’s access is scoped by delegated roles; cannot exceed what is granted by the customer; operations are audited.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Provider has owner access to the managed resource group and manages the entire solution life‑cycle.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Common scenarios&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Legacy cross‑tenant administration patterns in partner programs, now considered less secure and hard to scale.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Multi‑tenant monitoring, patching, policy enforcement, security posture management or support services for existing workloads.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Turnkey Marketplace offerings, SaaS extensions, complex enterprise architectures or packaged infrastructure solutions.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;col style="width: 25.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Lesser-Known Features and Tips&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Partner ID linkage for earned credit&lt;/STRONG&gt; – Members of the Microsoft AI Cloud Partner Program can associate their Partner ID with a service principal or user account. This allows Microsoft to identify partners driving Azure success and earn Partner Earned Credit (PEC). The account linked to the Partner ID must have access to every onboarded subscription.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Resource Graph&lt;/STRONG&gt; – Use Azure Resource Graph (ARG) to query resources across all delegated subscriptions from a single endpoint. For example, query compliance status of virtual machines across your customer base using Resources | where type =~ 'Microsoft.Compute/virtualMachines' along with tags or policy states. ARG provides aggregated visibility at scale.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cost management nuances&lt;/STRONG&gt; – Cost management via Azure Lighthouse &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/cross-tenant-management-experience#understanding-tenants-and-delegation:~:text=From%20the%20managing,Azure%20RBAC%20access." target="_blank" rel="noopener"&gt;displays pre-tax consumption at retail rates&lt;/A&gt;; purchases and discounts are not included. Ensure that your organization is aware of this when providing cost reporting to customers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Role updates and deprecations&lt;/STRONG&gt; – Roles can change over time; if a previously supported role gains DataActions permissions, &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/tenants-users-roles#:~:text=In%20some%20cases,the%20DataActions%20permission." target="_blank" rel="noopener"&gt;it becomes ineligible for new delegations, though existing assignments remain&lt;/A&gt;. Always review role definitions when updating templates.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Support for ISVs and multiple delegations&lt;/STRONG&gt; – Customers can &lt;A href="https://learn.microsoft.com/en-us/azure/lighthouse/concepts/architecture#:~:text=While%20in%20most%20cases%20only%20one%20service%20provider%20will%20be%20managing%20specific%20resources%20for%20a%20customer%2C%20it%E2%80%99s%20possible%20for%20the%20customer%20to%20create%20multiple%20delegations%20for%20the%20same%20subscription%20or%20resource%20group%2C%20allowing%20multiple%20service%20providers%20to%20have%20access." target="_blank" rel="noopener"&gt;delegate the same subscription or resource group to multiple service providers&lt;/A&gt;. This allows independent software vendors (ISVs) to project their own management resources into the customer tenant while other service providers manage operations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;Azure Lighthouse provides a robust and secure framework for multi-tenant management. By logically projecting delegated resources into a managing tenant, service providers and enterprises gain centralized visibility and automation while customers retain control over scopes and roles. Implementing Azure Lighthouse requires careful design of role assignments, adherence to security best practices, and continuous governance. For further reading and template samples, consult the &lt;A href="https://learn.microsoft.com/azure/lighthouse/" target="_blank" rel="noopener"&gt;Azure Lighthouse documentation&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 18:30:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/implementing-azure-lighthouse-a-technical-guide-for-service/ba-p/4490592</guid>
      <dc:creator>Preston_Romney</dc:creator>
      <dc:date>2026-02-19T18:30:46Z</dc:date>
    </item>
    <item>
      <title>CRL &amp; AIA Publishing Guidance (Practical PKI Part 2)</title>
      <link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/crl-aia-publishing-guidance-practical-pki-part-2/ba-p/4485713</link>
      <description>&lt;P&gt;My name is Ron Arestia, and I am a Security Researcher with Microsoft’s Detection and Response Team (DART). We respond to customer cybersecurity incidents to assist with containment and recovery from threat actors. In this blog post, we will be covering CRL and AIA publishing guidance with a focus on the Active Directory Certificate Services (ADCS) offline root Certificate Authority (CA). This is part 2 of a series on practical PKI implementation based around my experience with customer interactions working as a Microsoft engineer.&lt;/P&gt;
&lt;P&gt;Feel free to catch up on previous blog posts or jump right into this one:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/secure-configuration-and-hardening-of-active-directory-certificate-services/4463240" target="_blank" rel="noopener"&gt;Secure Configuration and Hardening of Active Directory Certificate Services&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/implementing-and-managing-an-adcs-offline-root-certificate-authority-part-1/4468175" target="_blank" rel="noopener"&gt;Implementing and Managing an ADCS Offline Root Certificate Authority (Part 1)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In Part 2 of our series, we will focus on the certificate revocation list (CRL) and authority information access (AIA) extensions with an example of manual maintenance on an offline root certificate authority (CA).&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The Certificate Revocation List&lt;/LI&gt;
&lt;LI&gt;Delta Certificate Revocation Lists&lt;/LI&gt;
&lt;LI&gt;The Authority Information Access Extension&lt;/LI&gt;
&lt;LI&gt;Publishing Considerations&lt;/LI&gt;
&lt;/OL&gt;
&lt;H1&gt;The Certificate Revocation List&lt;/H1&gt;
&lt;P&gt;The &lt;A href="https://datatracker.ietf.org/doc/rfc5280/" target="_blank" rel="noopener"&gt;IETF RFC 5280&lt;/A&gt; defines a Certificate Revocation List (CRL) as “a time-stamped list identifying revoked certificates that is signed by a CA or CRL issuer and made freely available in a public repository.” Since there are a number of nuances for both scope and application, this section will cover a standard two-tier public key infrastructure (PKI) where the root CA manages revocation for subordinate certificates, and the issuing CA manages revocation for issued endpoint certificates. It is important to note that CRLs and their repositories can be scoped for specific purposes, but we are focused on PKI basics in this blog and will cover custom implementations at a later time. In this section we will not address the Online Certificate Status Protocol (OCSP). This concept will be covered later.&lt;/P&gt;
&lt;P&gt;Everything about your PKI relies on proper maintenance of and access to the CRL. If the CRL is not available due to expiration or an outage of the endpoint hosting it, certificate revocation checking fails which means end users will receive a programmatic error from a web browser or the operating system itself.&lt;/P&gt;
&lt;P&gt;For instance, Figure 1 below shows that the CA in my lab is offline.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 1&lt;/PRE&gt;
&lt;P&gt;When I try to start the issuing CA, I receive the error shown in Figure 2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 2&lt;/PRE&gt;
&lt;P&gt;The CRYPT_E_REVOCATION_OFFLINE error indicates that a revocation lookup failed somewhere in the process of starting the issuing CA. If we open PKIView.msc (Figure 3), we can check the overall health of our PKI to determine what, if anything, is not functioning.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 3&lt;/PRE&gt;
&lt;P&gt;Here you see that the CRL for my root CA expired back in August 2025 (Figure 4). This would cause the issuing CA to not start up properly, supporting the idea that the CRL is important for the functionality of your PKI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 4&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To resolve this issue, we need to go to our offline root CA, generate a new CRL, and publish it to the location specified in the CA extension for proper lookup. My lab root CA is hosted on a Hyper-V server without connectivity to any network (Figure 5).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 5&lt;/PRE&gt;
&lt;P&gt;Notice that there are no network adapters for this Hyper-V VM. I can only access it from the host itself using the local console. Once logged in, note that I can see the root CA did, in fact, issue a CRL (Figure 6) the last time it was online (5 November 2025), but since the root CA is offline, and I did not manually copy the CRL from the machine, it did not update for the PKI globally, which is expected behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 6&lt;/PRE&gt;
&lt;P&gt;To remedy this, I am going to manually publish an updated CRL from the root CA (Figures 7 &amp;amp; 8) and copy it to the issuing CA for publishing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 7&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 8&lt;/PRE&gt;
&lt;P&gt;Once complete, we can view the CRL in the OS to verify the new timestamp (Figure 9)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 9&lt;/PRE&gt;
&lt;P&gt;Finally, we change the local administrator password on the offline root CA and shut it down. Since this is a virtual machine, we can browse on the Hyper-V host to the VM hard drive, mount it, and pull the CRL off of the disk (Figure 10).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 10&lt;/PRE&gt;
&lt;P&gt;Note: as per our last blog post, this is not considered secure since anyone with access to the file system of the Hyper-V host, including a threat actor, could perform the exact same action but with the root CA private key, effectively compromising your entire PKI. For the purposes of this blog series and in a non-production lab environment, this practice is overriding security in lieu of convenience. If, however, you have a proper Tier 0 virtualization host and are using an HSM, this could be functional for a production environment with adherence to cybersecurity best practices.&lt;/P&gt;
&lt;P&gt;Now we can drop the CRL on the issuing CA and copy it over to the web publishing endpoint (Figure 11).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 11&lt;/PRE&gt;
&lt;P&gt;This resolves the broken revocation check during startup of the issuing CA and brings the PKI back into the green in PKIView.msc (Figure 12).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 12&lt;/PRE&gt;
&lt;P&gt;In this section, we showed one of the common issues arising from an expired CRL and illustrated the importance of maintaining a healthy CRL publishing environment. We also walked through how to resolve this issue by issuing and publishing a new CRL from the root CA.&lt;/P&gt;
&lt;H1&gt;Delta Certificate Revocation Lists&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://datatracker.ietf.org/doc/html/rfc5280" target="_blank" rel="noopener"&gt;IETF RFC 5280&lt;/A&gt; defines a delta certificate revocation list as a CRL that “only lists those certificates, within its scope, whose revocation status has changed since the issuance of a referenced complete [base] CRL.” Delta CRLs are supplemental to the base CRL and allow for a “fresher” certificate revocation list without having to re-publish the base CRL every time a certificate is revoked. Delta CRLs can also help to reduce revocation lookup delays in an environment with particularly large base CRLs, but delta CRLs are functionally rolled up into the base CRL at the next base CRL publishing interval, so they do not provide any advantage over base CRLs with regards to overall size long term. Delta CRLs are especially useful in high-revocation environments where revocation needs to be respected quickly, as they are published at a more rapid interval than the base CRL. It is important to note, however, that delta CRL publishing intervals are not instantaneous, so a priority revocation such as for a compromised certificate would still require manually re-publishing either the base or delta CRL.&lt;/P&gt;
&lt;P&gt;It is critical to understand that delta CRLs are accepted and functional for Windows, but delta CRLs may not be respected by non-Windows systems. Some enterprise distributions of Linux do accept delta CRLs, but you may need to work with your distribution vendor to allow them otherwise. In the case of a CRL lookup by a system without delta CRL support, any certificates in the delta CRL would be overlooked during a CRL lookup in lieu of using the base CRL.&lt;/P&gt;
&lt;P&gt;By default, delta CRLs are configured for use in ADCS. When guiding customers, I make the case that unless they anticipate a high revocation load, using delta CRLs is unnecessary. Additionally, if the customer is leveraging non-Windows systems in their environment, I urge caution around delta CRLs to prevent a false sense of security around revocation. There is nothing inherently wrong with using delta CRLs out of the box but understanding their main purpose (faster revocation publishing out-of-band from the base CRL publishing) is important to drive outcomes.&lt;/P&gt;
&lt;P&gt;Delta CRLs have a place and are an accepted extension in PKI discussions, but deciding in advance if you will truly leverage their utility goes a long way to reduce administrative overhead of the PKI long term. If you do not anticipate doing regular revocation, they are an additional administrative touchpoint that will not serve your immediate or long-term needs. If, however, you are concerned about rapid response for revocation or having to manually issue out-of-band CRLs, then delta CRLs can help.&lt;/P&gt;
&lt;H1&gt;The Authority Information Access Extension&lt;/H1&gt;
&lt;P&gt;&lt;A href="https://datatracker.ietf.org/doc/html/rfc3280" target="_blank" rel="noopener"&gt;IETF RFC 3280&lt;/A&gt; defines the Authority Information Access (AIA) extension as “how to access CA information and services for the issuer of the certificate in which the extension appears.” This is an extension, similar to the CRL, that is not critical but recommended for the functionality of your PKI. This location, stamped on every certificate issued by a CA, is used to help end entities construct a valid certificate chain in the event there are any missing or outdated certificates. Without this extension, all certificates in an end entity chain would need to be trusted in advance by the system using the certificate.&lt;/P&gt;
&lt;P&gt;The publishing of the AIA location is separate from the CRL, but most PKI implementations use the same publishing endpoint for both. However, it is not necessary to publish to the same location. The AIA location will contain a copy of the public certificate for the root, policy, and issuing CAs in a PKI. You should &lt;STRONG&gt;never&lt;/STRONG&gt; publish private keys to this location. The certificates are necessarily accessible by any system. The private key is exactly that: private. It should only exist on the CA itself or, preferably, on an HSM.&lt;/P&gt;
&lt;P&gt;The AIA publishing location is part of the CA extension configuration on every ADCS CA (Figure 13) and can also be added to the Online Certificate Status Protocol (OCSP) extension, if desired.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;PRE class="lia-align-center"&gt;Figure 13&lt;/PRE&gt;
&lt;P&gt;Note the limited options for this configuration. This is by design. You are simply providing a web-based (or LDAP) endpoint to which an endpoint can refer to download additional certificates to build a trust chain. Publishing certificates to this endpoint is usually a manual process since CA certificate updates are a less frequent operation. It is possible to automate this using something like DFS-R or a scripted process, but that also increases your risk footprint.&lt;/P&gt;
&lt;P&gt;It is also important to note that the certificate file name in the publishing location must match exactly the name input into the extension. Any characters, including spaces, beyond what it explicitly declared in the extension will cause the AIA lookup to fail.&lt;/P&gt;
&lt;P&gt;A lack of a proper certificate in the AIA location will not generally cause a problem unless an endpoint needs a certificate from the chain. Unlike the CRL, missing AIA information will not cause a CA to not start, and end users will not be warned about missing the CA certificate unless it is necessary to build a chain which might otherwise present as a trust issue vs. a critical error. If the certificate chain is present in the local system or application trust store, the AIA location is not parsed.&lt;/P&gt;
&lt;P&gt;In summary, the AIA location is used to build certificate trust chains. They are often published to the same location as the CRLs and are simply copies of the public certificate for the root, policy, and/or issuing CA servers. This is a non-critical extension, but best practice is to make these available to consumers of your certificates.&lt;/P&gt;
&lt;H1&gt;Publishing Considerations&lt;/H1&gt;
&lt;P&gt;The most common question I have heard around CRL and AIA publishing is “what’s the best publishing interval?” The answer depends on your organization’s use of certificates and how aggressive you are with revocation. Our standard guidance provided to customers with low revocation and light usage is approximately one (1) year for a base CRL from the root CA. In the event you have to revoke a subordinate CA or policy CA certificate, you will be manually publishing a new CRL along with a new certificate for their replacements, so one (1) year provides a decent window for operation without completely forgetting the root CA exists. This helps to keep processes around root CA maintenance fresh for your administrative teams. Since issuing CAs are online and can be configured to write the CRL directly to publishing endpoints, a more rapid publishing cadence can be used. I normally recommend anywhere from one (1) week to one (1) month, depending on your anticipated revocation needs.&lt;/P&gt;
&lt;P&gt;For AIA publishing, we haven’t discussed CA certificate lifetimes yet, but given a standard two-tier PKI validity period of ten (10) years for the root CA and five (5) years for the issuing CA(s), the certificates published to the AIA location will usually be approximately five (5) years and two-and-a-half (2.5) years old, at most, respectively. (More on CA certificate lifetimes in a future blog post.) As a result, AIA publishing will be a manual process (but can be automated, if desired).&lt;/P&gt;
&lt;P&gt;Another common question is what protocols to use for publishing. Technically &lt;A href="https://datatracker.ietf.org/doc/html/rfc5280#section-3.4" target="_blank" rel="noopener"&gt;IETF RFC 5280 Section 3.4&lt;/A&gt; defines LDAP, HTTP, FTP, and X.500 for distribution. Out of the box, ADCS, when configured as an enterprise deployment, will define an HTTP and LDAP endpoint for CRL and AIA publishing. For the purposes of modern security best practice, I advise customers to stick to HTTP for a few reasons:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;HTTP is platform agnostic and acceptable for any network-based platform (Windows, Linux, Mac, mobile devices, network devices, etc.)&lt;/LI&gt;
&lt;LI&gt;HTTP presents little network overhead compared to LDAP&lt;/LI&gt;
&lt;LI&gt;Port 80 connectivity is much more palatable to a network security team than allowing communications broadly to port 389&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;In 15 years of working with ADCS, I have never come across an implementation using FTP. While it is supported as per the specifications, FTP presents a big target for threat actors and should be avoided. I have never seen a pure X.500 distribution configuration.&lt;/P&gt;
&lt;P&gt;If you are working in a majority Windows enterprise where everything is domain joined, it could be argued that LDAP is sufficient. LDAP is fault tolerant across all of your AD domain controllers, easily configured from PKIView.msc, endpoints easily managed by group policy, and when configured properly, secure. However, I do not advise relying solely on LDAP for CRL/AIA distribution, as non-Windows systems in your organization (i.e., network, storage, and virtualization platforms) will likely rely on your PKI and may or may not support LDAP calls for lookups.&lt;/P&gt;
&lt;P&gt;Additionally, as stated previously, LDAP calls are “expensive” compared to simple HTTP. When you have a conversation with your network security team about accessibility, you are likely to run into opposition to blanket TCP 389 access for your entire organization. Most enterprises with whom I have worked try to lock down port 389 as much as possible, and if you have a proper tier 0 or network segmentation, opening 389 globally introduces a level of risk I would not advise any organization to endeavor. If you or your team are insistent on relying on LDAP, I recommend using HTTP as your second option for fault tolerance and platform accessibility.&lt;/P&gt;
&lt;P&gt;HTTP is the best route for CRL and AIA publishing. It is fast, reliable, easily extensible using load balancers, and, in an IIS/Windows implementation, it is possible to configure ADCS to write the CRL directly to the file system of a web server(s) for publishing. It is also natively more secure to just open port 80 to serve up what amount to basic text files vs. opening port 389 to your entire AD infrastructure, allowing access to more than just the published files.&lt;/P&gt;
&lt;P&gt;Finally, it is critical to understand that &lt;STRONG&gt;your HTTP publishing endpoint must use port 80&lt;/STRONG&gt;. We get the question from time to time about whether or not you can put a certificate in front of the HTTP endpoint to “make it secure.” The problem with that is how are endpoints going to check for revocation of the certificate protecting that web endpoint if the web endpoint uses a certificate with a CRL published to the same location? You will create a loop condition, and the CRL lookup will fail.&lt;/P&gt;
&lt;P&gt;Can you put a certificate in front of it? Technically you could, but it would have to be a certificate with a CRL serviced from a different endpoint, likely publicly accessible, which means you are spending money and administrative cycles to maintain a certificate outside of your own PKI which, in my opinion, defeats the purpose of standing up the PKI in the first place.&lt;/P&gt;
&lt;P&gt;There is nothing inherently risky about having port 80 open to the specific endpoint, and you can implement security measures on the web server to ensure that a threat actor cannot abuse the web server. All you are serving from that endpoint are some plain text files with information that is necessarily public. There is not anything inherently sensitive in the CRL or AIA that would necessitate protecting the connection with SSL/TLS.&lt;/P&gt;
&lt;P&gt;As with many points discussed in this blog, your outcomes may vary. You may have different revocation needs or perhaps you just do not want to deal with booting your root CA annually to do CRL maintenance. For a basic enterprise PKI, the numbers called out in this blog post for publishing intervals should be sufficient to keep things functional without casting aside the need to keep your root CA top-of-mind for your administrative team. Take the time to discuss your needs with your larger organization and set expectations for regular maintenance of your PKI to ensure it remains functional and secure.&lt;/P&gt;
&lt;P&gt;That is all for part 2 of our ADCS blog. In part 3, we are going to start shifting away from the root CA as the primary focus to discuss PKI purpose and common hierarchies.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 05:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/crl-aia-publishing-guidance-practical-pki-part-2/ba-p/4485713</guid>
      <dc:creator>RonArestia</dc:creator>
      <dc:date>2026-02-09T05:00:00Z</dc:date>
    </item>
  </channel>
</rss>

