extension
71 TopicsAlternatives After the Deprecation of the Azure SQL Migration Extension in Azure Data Studio
The Azure SQL Migration extension for Azure Data Studio is being deprecated and will be retired by February 28, 2026. As part of our unified and streamlined migration strategy for Azure SQL, we are consolidating all migration experiences into a consistent, scalable platform. If you are currently using the Azure SQL Migration extension, this blog will guide you through recommended replacement options for every phase of migration, whether you are moving to Azure SQL Managed Instance, SQL Server on Azure Virtual Machines, or Azure SQL Database. What is happening to the Azure SQL Migration extension in ADS? As you already know, Azure data studio will officially retire on February 28, 2026. The Azure SQL Migration extension in Azure Data Studio will also retire along with Azure Data Studio on February 28, 2026. The Azure SQL Migration extension will no longer be available in the marketplace of Azure Data Studio. What should you use instead? Below is the updated guidance for the migration tool categorized by migration phase and target. 1) Pre‑Migration: Discovery & Assessments Prior to migration, it is advisable to evaluate the SQL Server environment for readiness and to determine the right-sized Azure SQL SKU. Below are the recommended options: A) SQL Server enabled by Azure Arc Use the SQL Server migration experience in the Azure Arc portal for: Instance discovery at scale Migration assessments at scale, including: Readiness assessment for all Azure SQL targets. Performance-based, right-sized target recommendations. Projected Azure costs with the recommended target configuration. Reference: Steps to get started with the Azure Arc assessments- Deploy Azure Arc on your servers. SQL Server instances on Arc-enabled servers are automatically connected to Azure Arc. See options to optimize this. B) Automated assessments at scale using Azure DMS PowerShell and Azure CLI The Azure DataMigration modules in Azure PowerShell and Azure CLI can be used to automate assessments at scale. Learn more about how to do this. Here are the sample templates to automate the assessment workflow: Azure PowerShell DataMigration cmdlets DMS Azure CLI commands C) Azure Migrate For scenarios where assessments are required at data center level including different types of workloads like Applications, VM Servers and databases, use Azure Migrate to perform discovery and assessments at scale. Learn more about Azure Migrate. References: Review inventory Create SQL Assessment Review SQL Assessment 2) Migrations Based on the migration targets, here are the recommended tools you can use to carry out the migration: A. To Azure SQL Managed Instance The following options are available for migrating data to Azure SQL Managed Instance: 1. SQL Migration experience in Azure Arc For migrations to Azure SQL MI, leverage the streamlined SQL Migration experience in Azure Arc which lets you complete the end-to-end migration journey in a single experience. This experience provides: Evergreen assessments and right-fit Azure SQL target recommendation. Inline Azure SQL Target creation. Free Azure SQL MI Next generation General Purpose service that lets you experience the power of Azure SQL MI for free for 12 months. Near zero downtime migration using Managed Instance link powered by Distributed Availability Group technology. Secure connectivity. Reference blog: SQL Server migration in Azure Arc 2. Automated migration at scale using Azure DMS PowerShell and Azure CLI To Orchestrate migrations to Azure SQL MI at scale programmatically, use: DMS PowerShell cmdlets DMS Azure CLI commands Learn more about how to do this. B. To SQL Server on Azure Virtual Machines To migrate to SQL Server on Azure Virtual Machines, use: 1. Azure Database Migration Service (DMS) DMS supports migrating to SQL Server on Azure Virtual Machines using both online and offline methods. Your SQL Server backups can be in Azure Blob Storage or on a network SMB file share. For details on each option, see: Backups stored in Azure Blob Storage Backups maintained on network SMB file shares Note: The migration experience from SQL Server on-premises to SQL Server on Azure VM will soon be available in SQL Server enabled by Azure Arc. 2. Automated migration at scale using Azure DMS PowerShell and Azure CLI For programmatic migrations to Azure SQL Virtual Machines: DMS PowerShell cmdlets DMS Azure CLI commands Learn more about how to do this. 3. SSMS option: SQL Server Management Studio (SSMS) migration component If you can connect to both SQL Server on-premises and SQL Server running on Azure VM using SQL Server Management Studio, the migration component in SSMS can help you to migrate to SQL Server on Azure VM. For details, see SSMS Migration component. C. To Azure SQL Database Migrating a SQL Server database to Azure SQL Database typically involves migrating schema and data separately. Here are the options to perform offline and online migration to Azure SQL Database: 1. Offline migration to Azure SQL Database a. Azure Database Migration Service (DMS) portal experience Use Azure DMS portal to migrate both schema and data. Azure DMS uses Azure Data Factory and leverages the Self-hosted Integration Runtime (SHIR). Installation steps are here. b. Automated migration at scale using Azure DMS PowerShell and Azure CLI Use Azure DMS PowerShell and Azure CLI command line to orchestrate the schema and data migration to Azure SQL Database at scale: DMS PowerShell cmdlets DMS Azure CLI commands Learn more about how to do this. 2. Online migration to Azure SQL Database Using Striim To enable online migration of your mission critical databases to Azure SQL Database leverage Striim. Microsoft and Striim have entered a strategic partnership to enable continuous data replication from off-Azure SQL Servers to Azure SQL Database with near-zero downtime. For more details, refer to: Zero downtime migration from SQL Server to Azure SQL Database | Microsoft Community Hub Removing barriers to migrating databases to Azure with Striim’s Unlimited Database Migration program... To leverage the Striim program for migrations, please reach out to your Microsoft contact or submit the below feedback to get started. Summary The table below provides a summary of the available alternatives for each migration scenario. Migration Scenario Guided experience Automation experience Pre-Migration (Discovery + Assessment) SQL Migration experience in Azure Arc / Azure Migrate DMS PowerShell / Azure CLI To Azure SQL Managed Instance SQL Migration experience in Azure Arc DMS PowerShell / Azure CLI To SQL Server on Azure Virtual Machine DMS Azure Portal / SSMS migration component DMS PowerShell / Azure CLI To Azure SQL Database DMS Azure portal (offline & schema migration) / Striim (online migration) DMS PowerShell / Azure CLI (offline & schema migration) Final Thoughts Simplify your SQL migration journey and improve migration velocity to all Azure SQL targets, leverage the connected migration experiences in SQL Server enabled by Azure Arc, DMS, and SSMS. For SSMS, as a first step we brought the capabilities to perform assessment and migration to higher versions of SQL Server including to SQL Server on Azure Virtual Machines. As a next step, we are bringing cloud migration capabilities as well into SSMS. Feedback We love hearing from our customers. If you have feedback or suggestions for the product group, please use the following form: Feedback form As you begin your migration to Azure, we welcome your feedback. If you do not see suitable alternatives for any migration phases, use the feedback form to let us know so we can update the options accordingly.344Views0likes0CommentsUsing Active Directory Extension on Member Server
Hello WAC fellows, Is it possible to use the Active Directory extension on Member Server (with RSAT-AD-Tools installed) instead of connecting directly to a Domain Controller? I'd like to let users do certain tasks using an AD-Frontend of WAC, but I don't want to give them any kind of permission on the Domain Controllers. Ideally they would connectto a Management-Server using WAC and edit the AD using the AD-Extension. Any ideas?1.5KViews1like2CommentsExtension ID: gdndpilddmlahjjcfmknlmindbklnbel Meeting Scheduler
Meeting Scheduler The extension is flagged with a warning that it contains malware. I am not aware how it got installed although The source of the extension is the "Microsoft Edge Add-ons Store but not able to find it on store. Can someone help with the triage how it could have got installed and what is this extension113Views1like0CommentsAdblock extensions stop working Edge iOS on clearing browsing data
Ghostery and uBlock Origin Lite are available on Edge iOS as MV3 extensions for ad blocking but they stops working when Clear Browsing Data option is clicked for either time period, Last hour or All Time For making them work, Edge needs to be restarted or extensions need to be re-enabled I request Edge iOS team to fix this issue32Views0likes0CommentsChrome extension managed storage policy
Hi there, I've developed a chrome extension and now we want to deploy it using Intune. Force install of extension works great but I can't pass managed data to the extension. Here is the scheme: { "type": "object", "properties": { "apiKey": { "title": "API Key", "description": "An API key to communicate with server.", "type": "string" } } } This is the policy that I created in Intune: OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Chrome~Policy~googlechrome~3rdparty~extensions~eagefwefpbjpewefliifpgfgoewfknnmk~policy Data type: String Value: {"apiKey":"mykey123"} But it doesn't appear in chrome://policy and when I get policies in my code with: const result = await chrome.storage.managed.get(null); The result is empty! What is the problem here? And how to fix it?87Views0likes0CommentsDefender Browser Protection Extension for Chrome
Has any one noticed how pointless this extension is? Deployed using Intune with tamper protection so the user is forced to use it, but Microsoft has built in a disable feature to the extension that can not be controlled, or can it? Any ideas on how to harden this, or something for Microsoft to fix? Tamper Protection enabled: User can bypass by disabling the protection:214Views1like1CommentFeature Badge Request
Hello, How can I request a feature badge for my extension on the Edge Add-ons Store? My extension, https://microsoftedge.microsoft.com/addons/detail/free-vpn-proxy-1vpn/dalhgafbhpdolibignjckpmiejgfddjp, follows Microsoft’s best practices for privacy, security, and user experience. It has more users and a higher rating than many VPN proxy extensions that currently have a feature badge. Without the badge, it doesn’t even show up when https://microsoftedge.microsoft.com/addons/search/1vpn, which seems like a poor experience for users. Thank You90Views0likes0CommentsCopilot or Discover browser extension not working as expected for managed Edge browser
If your organization manages the MS Edge browser or has decided to limit the availability of Copilot (previously known as Discover in Edge) until administrators have a handle on its capabilities and risks, then this post may be helpful. You will find in the following article -- https://learn.microsoft.com/en-us/copilot/edge#summarization-by--in-edge -- Microsoft suggests for Admins who want to manage Copilot in Edge, they can "use multiple group policy settings to manage the behavior of the Copilot in Edge sidebar:" # I have found it very strange, especially when referencing brand new tools like Copilot, that Microsoft documentation suggests admins are still using, or should use group policy as opposed to more modern management tools like Intune # The article suggests the below "group policy settings" can be used to manage Copilot behavior in Edge: To allow or block Copilot in Edge from using browsing context, use the https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies policy. This prevents Copilot from using webpage or PDF content from being used to respond to prompts. To disable Copilot in Edge entirely, use the https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies policy. Blocking Copilot in Edge automatically blocks all Edge sidebar apps from being enabled. Now according to these instructions, you would use the https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies policy to allow Copilot in Edge to use browsing context and seemingly (since https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies is used to disable Copilot) you would set https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies to enabled in order to force Copilot to appear and be available for your users. To an admin still using group policy to set these maybe everything works fine -- In previous testing I have hacked my registry to create the above keys and can't remember the results, but it was kind of a pointless test since I personally use Intune to manage our Edge browser. If you're like me and use Intune to manage Edge's browser configuration at your organization, then seeing the keys above may prompt you to head to the Intune settings catalog to look for equivalent settings that you can use to set similar policy. Next, I'll share my findings from diving into how I might use something available in the Intune settings catalog. My findings are as follows: Show Copilot -- you will find this setting if you nav down through edge://settings/sidebar. With no settings configured related to Copilot you will see this in the off state and when you hover the briefcase icon where you would usually see "this setting is managed by your organization," you will just see a blank textbox. Right out of the gate this is a weird behavior and the only thing I have been able to chalk it up to so far is a bug -- my thinking is if your browser is managed by the organization then by default the Show Copilot setting will be in the off state. Ok, so now how do we actually get this thing on if we are ready for our users to use it? Discover feature In Microsoft Edge -- this is a setting you can find in the Intune settings catalog. Previously Copilot in Edge was called Bing Discover and it had a "B" icon. If you configure this setting today and set it to enabled you might expect it to display Discover or Copilot, however, when you check the edge://policy report you will find that EdgeDiscoverEnabled (as it shows up on the report) actually errors out and is described as an "unknown policy," and there will be no effect to the browser or to the Show Copilot setting I discussed above. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies -- now back to the HubsSidebarEnabled setting referenced in the linked Microsoft documentation. Supposedly you would use this setting to "disable Copilot in Edge entirely." Now you can find a setting called Show Hubs Sidebar in the Intune settings catalog and you can set it to enabled. When you nav to the edge://policy report you will even see it successfully configured and reporting in as OK. However, in my testing I have not seen this have any effect on the Always show sidebar setting found at edge://settings/sidebar, and I have not seen this have any effect on the Show Copilot setting found at edge://settings/sidebar when you drill into the Copilot settings. So, my only conclusion here is that the HubsSidebarEnabled from the Intune settings catalog isn't ready for showtime. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies -- This is a setting you can find in the Intune settings catalog called Enable Discover access to page contents for AAD profiles. This setting will successfully configure and report back as OK in edge://policy report, however, I have not tested any further and can't tell you if it is actually doing what it intends to since I have not successfully configured Copilot using the other Intune settings. The only success I have found so far in all of this Copilot, Discover and Sidebar research are the following two extension IDs that can be added to your force install extension list -- and as a result the Copilot browser extension should appear. If you are new to using Intune to manage browser policy and aren't sure what I mean by the 'force install extension list,' drop a comment and I'll be happy to add some detail about that. Extension IDs: nkbndigcebkoaejohleckhekfmcecfja ofefcgjbeghpigppfmkologfjadafddi I found these extension IDs by using ctrl + f on the edge://sidebar-internals page looking for results related to the search term "Discover." At the moment this seems like the best way to enable and test Copilot until the Intune settings currently available begin working as they are described. This is not meant to criticize the speed at which Microsoft has made settings available or set them up to work perfectly, but to prompt discussion and help others who might be going in circles trying to figure out if they're configuring something incorrectly. TL;DR There are currently settings in the Intune settings catalog that don't seem to work as expected if you are trying to enable/disable Copilot for a managed instance of Edge at your organization. As a workaround there are a couple extension IDs that can be added to your ForceInstallExtension list to help display Copilot in the Edge sidebar. I've attached some screenshots related to different things referenced in this post.Solved14KViews3likes6CommentsPart 1 - Develop a VS Code Extension for Your Capstone Project
API Guardian - My Capstone Project As software and APIs evolve, developers encounter significant difficulties in maintaining and updating API endpoints. Breaking changes can lead to system instability, while outdated or unclear documentation makes maintenance less efficient. These challenges are further compounded by the time-consuming nature of updating dependencies and the tendency to prioritize new features over maintenance tasks. The absence of effective tools and processes to tackle these issues reduces overall productivity and developer efficiency. To address this, API Guardian was created as a Visual Studio Code extension that identifies API endpoints in a project and checks their functionality before deployment. This solution was developed to help developers save time spent fixing issues caused by breaking or non-breaking changes and to alleviate the difficulties in performing maintenance due to unclear or outdated documentation. Features and Capabilities This extension has 3 main features: Feature 1. Developers can decide if the extension will scan or skip specified files in the project. Press “Enter” to scan/skip all files. Type the file name (e.g., main.py) and press “Enter” to scan/skip a single file. Type file names with a delimiter (e.g., main.py | pythonFile.py) and press “Enter” to scan/skip multiple files. Feature 2. Custom hover messages when developers mouse over identified APIs This hover message will vary based on the status of the APIs. If the API returns a success status, the hover message will only show the completed API and its status. However, if an error occurs, the hover message will include this additional information: (1) API Name, (2) Official API Link, (3) Error Message, (4) Title of Recommended Fix and (5) Link to the Recommended Fix. Feature 3. Excel Report with Details of Identified APIs After all the identified APIs have been tested, an excel report will exported with the following information to allow developers to easily identify the APIs in the project. What Technology and Products does it involved? Building a Visual Studio Code extension and publishing it to the Visual Studio Marketplace involves a mix of technologies and tools. The project was initiated using the NPM package, generator-code, to set up a JavaScript project for developing the extension. All the extension's logic will be developed and managed within the "extension.js" file generated during the setup process. Once ready for deployment, we will package the extension using "vsce" to generate a ".vsix" file, which will then be used for deployment to the Visual Studio Code Marketplace. The deployment process involves requiring the user to create a publishing account and using tools like vsce to upload and manage the extension's version, updates, and metadata. As part of this process, you would need to create a Personal Access Token (PAT) from Azure DevOps. This token is used to verify your identity and authenticate the publishing tool, allowing you to securely upload your extension to the Visual Studio Marketplace. The PAT provides the necessary permissions for tasks such as version management, publishing new releases, and updating the extension metadata. What did I learn? Throughout this journey, I learned not just about the technical stack but also about the value of detailed project setup and secure publishing processes. While the technical steps can be challenging, they’re incredibly rewarding, and I’m excited to dive deeper into it moving forward. I’m looking forward to exploring how the extension can be further improved and enhanced. If you're interested in learning more about how my API guidance was built, keep an eye out for my next post! API Guardian https://marketplace.visualstudio.com/items?itemName=APIGuardian-vsc.api About the Authors Main Author - Ms Joy Cheng Yee Shing, BSc (Hon) Computing Science Academic Supervisor - Dr Peter Yau, Microsoft MVP471Views0likes0Comments