Archivi categoria: Microsoft Azure

Azure Hybrid Management & Security: What’s New and Insights from the Field – November 2025

Once again this month, I’m back with my recurring series focused on the evolution of Azure management and security services, with a special focus on hybrid and multicloud scenarios enabled by Azure Arc and enhanced by the use of Artificial Intelligence.

This monthly series aims to:

  • Provide an overview of the most relevant updates released by Microsoft;

  • Share operational tips and field-proven best practices to help architects and IT leaders manage complex and distributed environments more effectively;

  • Follow the evolution towards a centralized, proactive, and AI-driven management model, in line with Microsoft’s vision of AI-powered Management.

The main areas addressed in this series, together with the corresponding tools and services, are described in this article.

Hybrid and multicloud environment management

Azure Arc

Decommissioning of Windows Server 2022 on Azure Arc–enabled Azure Kubernetes Service

Microsoft has announced the decommissioning of Windows Server 2022 on Azure Kubernetes Service (AKS) enabled by Azure Arc, effective from October 2026. Following this change, customers who are using node pools based on Windows Server 2022 in Azure Arc–enabled AKS clusters are encouraged to proactively plan migration to supported alternatives before the retirement date. After October 2026, Windows Server 2022 on Azure Arc–enabled AKS will no longer receive updates or security fixes, and new deployments based on this operating system will no longer be supported.

The announcement confirms Microsoft’s focus on modern, cloud-ready platforms and operating system images optimized for containers, targeting Kubernetes scenarios both in Azure and in hybrid environments through Arc. Organizations therefore have a clear timeline to assess their containerized workloads, identify dependencies and constraints, and adopt supported Windows Server versions or other recommended options. This transition path is essential to preserve adequate levels of security, supportability, and compliance, while minimizing operational risk across distributed and Arc-enabled Kubernetes clusters.

New migration experience for SQL Server in Azure Arc

A new migration experience for Structured Query Language (SQL) Server instances managed through Azure Arc is now generally available. This approach integrates Azure Database Migration Service (DMS) with guided support from Copilot, providing an end-to-end path to Azure SQL Managed Instance that covers initial assessment, planning, migration execution, and post-cutover validation within a single flow.

The solution is designed for environments where SQL Server is still running on-premises or in other clouds, but is managed through Azure Arc to centralize governance and compliance. Thanks to automation and the guidance offered by Artificial Intelligence (AI), IT teams can reduce the risks associated with migration, standardize the process across multiple instances, and accelerate the transition to a managed Platform as a Service (PaaS) model, aligned with data estate modernization strategies.

Azure Kubernetes Fleet Manager for Azure Arc–enabled clusters (preview)

Azure Kubernetes Fleet Manager extends in public preview its support for Kubernetes clusters enabled with Azure Arc. Through a single control plane, organizations can register, govern, and deploy workloads consistently across Azure Kubernetes Service (AKS) clusters in Azure, on-premises Kubernetes clusters, and clusters running in other clouds.

The solution makes it possible to apply uniform configurations, update strategies, and security policies across all environments, reducing the operational complexity typical of hybrid and multicloud scenarios. This capability is particularly useful for managing distributed Artificial Intelligence (AI) workloads and deployments in edge locations, where standardizing management and security models is crucial to ensure reliability, scalability, and centralized control.

Security posture across hybrid and multicloud infrastructures

Microsoft Defender for Cloud

Native integration between Microsoft Defender for Cloud and GitHub Advanced Security (preview)

A native integration between Microsoft Defender for Cloud and GitHub Advanced Security is now available in preview, designed to protect cloud-native applications across the entire lifecycle, from code to runtime. In response to the increasing sophistication of software supply chain attacks, the solution introduces runtime context as a primary criterion for risk prioritization, enabling development and security teams to focus on truly exploitable vulnerabilities and remediate them more quickly through Artificial Intelligence (AI)–assisted remediation mechanisms.

Key capabilities include real-time visibility across the entire application lifecycle and the ability for security teams to launch remediation campaigns that notify GitHub owners directly, open GitHub issues from within Defender for Cloud, and monitor their status. By linking runtime context back to the code, developers can quickly map threats to the relevant repository, while security teams gain full traceability from code to execution. The use of Copilot Autofix and the GitHub Copilot coding agent makes it possible to automatically generate remediation suggestions, significantly reducing time to fix and improving the quality of applied remediations.

New Azure Copilot agents integrated into the portal and operational tools (preview)

The new phase of Azure Copilot introduces specialized agents, available in private preview, integrated directly into the Azure portal, PowerShell, and the Command Line Interface (CLI). These agents are designed to support customers in migration, day-to-day operations, and ongoing modernization of workloads running anywhere, enabling end-to-end lifecycle management of resources. Azure Copilot evolves the chat experience into a full-screen command center, powered by advanced reasoning capabilities based on GPT-5, artifact generation, and scenarios driven by Azure Resource Manager (ARM).

Users can invoke Copilot within existing workflows through contextual, personalized experiences that include conversation history and inline actions in the Azure portal. The new capabilities honor existing Role-Based Access Control (RBAC) mechanisms, Azure Policy, and compliance frameworks, and they always require explicit confirmation before applying changes.

Among the agents’ capabilities are: Deployment, to simplify the planning and rollout of infrastructure aligned with the best practices of the Well-Architected Framework; Migration, to accelerate migration and modernization with automated discovery and AI-driven Infrastructure as a Service (IaaS) / Platform as a Service (PaaS) recommendations, integrating with GitHub Copilot to modernize .NET and Java applications; Optimization, to highlight high-impact actions in terms of cost and sustainability, comparing financial results and carbon emissions and automating execution through agentic workflows; Observability, which leverages metrics, traces, and logs from Azure Monitor Application Insights or Service Groups to investigate and diagnose full-stack applications and provide mitigation steps; Resiliency, with recommendations for zonal resilience, auto-remediation scripts, orchestration of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) targets, built-in ransomware protection, and contextual insights for more robust configurations; Troubleshooting, which enables users to start troubleshooting sessions, obtain root cause analyses and mitigation suggestions for virtual machines, Kubernetes, databases, and other resources, including the automatic creation of support tickets when escalation is required.

Security posture management for serverless resources in Microsoft Defender for Cloud (preview)

At the end of November, Microsoft Defender for Cloud will introduce, in preview, security posture management for serverless resources. As the adoption of serverless solutions in multicloud environments increases at the expense of purely Infrastructure as a Service (IaaS) models, potential entry points multiply and lateral movement becomes easier for attackers, making these resources particularly exposed.

The new serverless coverage in Defender for Cloud provides deeper visibility into compute environments and application platforms based on managed functions and components. By integrating serverless posture information into attack paths, the solution strengthens end-to-end security with comprehensive protection for workloads and services. In preview, organizations will have access to Cloud Security Posture Management (CSPM) insights for resources such as Azure Functions, Azure Web Apps, and Amazon Web Services (AWS) Lambda; they will be able to identify and visualize risk, analyze attack paths, continuously monitor misconfigurations, and detect vulnerable instances. The result is a strengthened security posture across the entire lifecycle of modern applications, aligned with the evolution toward cloud-native and serverless architectures.

Unified posture management and threat protection for AI agents in Microsoft Defender (preview)

Preview capabilities for unified security posture management and threat protection for Artificial Intelligence (AI) agents are now available in Microsoft Defender as part of Microsoft Agent 365. With the growing adoption of agentic applications across pro-code, low-code, and no-code environments, the complexity and attack surface of digital estates increase significantly. Both AI developers and security administrators need a unified view of AI assets to govern security posture and reduce risk, while Security Operations Center (SOC) analysts must be able to correlate AI security signals with contextualized alerts to speed up remediation.

The new capabilities address these needs in three main areas: complete visibility into the posture of AI agents through a unified experience that offers visibility, posture management, and threat protection for agents distributed across pro-code, low-code, and no-code platforms, reducing issues such as shadow agents and agent sprawl; risk reduction through security recommendations and attack path analysis specific to agentic applications, helping teams identify and fix vulnerabilities before compromise; and advanced protection that enables detection, investigation, and response to threats targeting AI agents—such as prompt injection, exposure of sensitive data, and malicious use of tools—across models, agents, and cloud apps. The new detections correlate signals with threat intelligence, delivering a complete view of alerts. The distinctive element of Defender’s AI security offering is its end-to-end approach, from build-time to runtime, with unified protection that covers models, agents, Software as a Service (SaaS) applications, and cloud infrastructure.

Unified cloud security with Microsoft Defender in hybrid and multicloud environments (preview)

A new unified cloud posture management experience for Microsoft Defender for Cloud (MDC) customers is now available in preview. Security teams increasingly have to manage risk in complex hybrid and multicloud environments, where fragmented signals, siloed tools, and disjointed views slow down threat detection and response. The new native integration will bring Microsoft Defender for Cloud into the Defender portal dedicated to security roles, eliminating silos and enabling SOC teams to see and manage threats across all environments from a single console.

The experience will include a cloud security dashboard that unifies posture management and threat protection, offering a comprehensive view of the environment; unified cloud posture capabilities within Exposure Management, to display assets, vulnerabilities, attack paths, security scores, and prioritized recommendations in a single view; and a centralized asset inventory, with a consolidated view of code and cloud resources across Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP), supporting posture validation and logical segmentation of environments.

Complementing this integration, granular RBAC controls will help reduce operational risk and simplify compliance in multicloud contexts. With threat protection already deeply integrated into the Defender portal, extending it to posture management will deliver a complete cloud security model within a unified experience. The Azure portal will nonetheless remain a key reference point for DevOps personas and for onboarding new resources covered by Defender for Cloud.

New Microsoft Defender capabilities for proactive actions during attacks (preview)

Microsoft Defender is introducing, in preview, several innovations designed to strengthen the ability to detect and counter ongoing attacks. Among these, Predictive Shielding represents an evolution of the automatic attack disruption capability: once a compromised resource has been contained, it leverages threat intelligence and insights derived from the relationship graph to predict potential lateral movements by attackers and apply targeted, just-in-time hardening actions, such as changes to Group Policy Objects (GPOs) or disabling Safe Boot.

This approach drastically reduces the number of potential attack paths, concentrating risk on a much smaller set of trajectories and optimizing operational continuity. Microsoft is also extending automatic attack disruption capabilities—previously limited to Defender solutions—to third-party environments such as AWS, Proofpoint, and Okta when their signals are ingested via Microsoft Sentinel. In this way, threats such as phishing, adversary-in-the-middle attacks, and identity compromise can be detected and contained in near real time even on federated accounts and external cloud environments.

Finally, a new Threat-Hunting Agent will allow analysts to orchestrate threat hunting sessions in natural language, asking questions such as “Which devices have communicated with this domain in the last 24 hours?” and receiving summarized answers, the underlying Kusto Query Language (KQL) queries, and dynamic suggestions for further investigation—all within a chat interface. The agent will also provide contextual insights and visualizations, such as timelines, making advanced hunting capabilities accessible even to those without deep query expertise.

Integrated threat detection in Azure Backup for virtual machines, powered by Microsoft Defender for Cloud (preview)

Azure Backup is introducing, in public preview, integrated threat detection capabilities for backups of Azure virtual machines (VMs), powered by Microsoft Defender for Cloud. Restore points are analyzed for malicious indicators such as traces of malware or ransomware, allowing teams to assess the security state of backups before using them in a recovery operation.

Suspicious activities are surfaced through Defender for Cloud, enabling security and operations teams to avoid restoring compromised images and to react more quickly to attacks that might otherwise remain hidden within backup data. This integration strengthens alignment between data protection strategies and security practices, transforming backup from a simple recovery mechanism into an active component of defense against threats and improving the overall resilience of Azure environments.

Backup & Resilience

Azure Backup

Vaulted backup for Azure Data Lake Storage Gen2

Vaulted backup for Azure Data Lake Storage (ADLS) Gen2 is now generally available through Azure Backup, providing organizations with secure, off-site protection for data stored in their storage accounts. This capability allows you to create an independent copy of ADLS Gen2 data in a backup vault, isolated from the source account, thereby mitigating the risk of accidental deletions, malicious activity, and ransomware. Customers can also restore data to alternative storage accounts, enabling “clean recovery” scenarios and increasing the overall resilience of the environment.

The solution supports flexible, automated schedules, with daily or weekly backup policies and the option to run on-demand backups when needed. Long-term retention of backups is also supported, for up to 10 years, helping organizations meet compliance and archival requirements. Security aspects are built in by design, thanks to features such as soft delete, immutability, encryption, and multi-user authorization to protect the data stored in the vault. At the time of general availability, vaulted backups can be configured for block blobs in ADLS Gen2 accounts and are available in a subset of regions compared to the public preview, with an expanded geographic coverage planned over the coming months.

Monitoring

Azure Monitor

Unified onboarding experience in Azure Monitor for AKS and virtual machines

Azure Monitor now offers a unified onboarding experience for Azure Kubernetes Service (AKS) clusters and virtual machines (VMs). Instead of having to follow separate procedures and flows, with different extensions depending on the type of workload, organizations have a single streamlined path that deploys the latest Azure Monitor capabilities with one click.

This approach significantly reduces the risk of configuration drift across environments, accelerates the adoption of common monitoring baselines, and makes it easier to standardize observability in mixed contexts that rely simultaneously on AKS clusters and VM-based workloads. From a centralized, AI-powered management perspective, having a consistent onboarding model is a key element to ensure telemetry data quality, uniform controls, and the ability to apply advanced analytics and automation at scale.

Advanced sampling and enriched data collection in the Azure Monitor OpenTelemetry Distro

The Azure Monitor OpenTelemetry (OTel) Distro is now generally available with advanced sampling capabilities and richer data collection features. The solution provides more flexible sampling options—for example, rate-based or trace-aware strategies—and improves correlation across logs, metrics, and traces.

The goal is to enable organizations to reduce noise and the overall volume of telemetry while maintaining full visibility into critical transactions and the most business-relevant application scenarios. In environments characterized by distributed architectures, microservices, and hybrid or multicloud workloads, this evolution supports a more sustainable and effective observability model, and also facilitates the application of Artificial Intelligence (AI) algorithms for proactive anomaly detection, automated problem diagnosis, and prioritization of operational interventions.

Recommended alerts for Azure Monitor Workspace (preview)

Azure Monitor is introducing, in preview, a recommended alerts feature that can be enabled with one click in the portal for Azure Monitor Workspaces that collect managed Prometheus metrics. These are preconfigured alert rules designed to monitor workspace limits and ingestion quotas, with the goal of promptly identifying throttling conditions and preventing the loss of metrics or the creation of “blind spots” in the observability platform.

Thanks to these recommended alerts, teams can quickly establish a consistent monitoring posture across multiple environments without having to design every single rule from scratch. For architects managing distributed environments—often hybrid and multicloud—this capability is a practical way to raise the reliability level of monitoring, freeing up time to focus on optimizations and on introducing advanced analytics logic supported by Artificial Intelligence (AI).

New OpenTelemetry visualizations and advanced monitoring experience for Azure VMs and Azure Arc servers (preview)

Azure Monitor is introducing, in public preview, new OpenTelemetry (OTel)–based visualizations and a unified monitoring experience for virtual machines (VMs) in Azure and servers enabled with Azure Arc. This new mode consolidates key observability capabilities—metrics, logs, and a topology-style representation of dependencies—into a single view aligned with the OpenTelemetry data model.

This makes it easier to analyze end-to-end performance and identify points of failure, especially for organizations that are already standardizing application and infrastructure telemetry on OpenTelemetry. For hybrid and multicloud scenarios, the ability to have a consistent view across resources in Azure and servers managed via Azure Arc helps IT teams reduce tool fragmentation, simplify troubleshooting, and lay the groundwork for increasingly automated, AI-powered management models.

Conclusions

In conclusion, this month’s updates strongly confirm Microsoft’s trajectory toward a truly unified, hybrid, Artificial Intelligence (AI)–powered cloud management and security model, in which Azure Arc becomes the common thread connecting datacenters, edge locations, and public clouds. On the one hand, advancements on the management front—such as the new migration experience for SQL Server to Azure SQL Managed Instance, support for Azure Kubernetes Fleet Manager for Arc-enabled clusters, vaulted backup for Azure Data Lake Storage Gen2, and the new OpenTelemetry-based monitoring experiences—equip architects with the tools to rationalize distributed architectures, reduce technical debt, and improve observability and resilience. On the other hand, innovations in Microsoft Defender for Cloud and the broader Defender platform—including integration with GitHub Advanced Security, posture management for serverless resources and Artificial Intelligence (AI) agents, the new unified cloud security experience, and integrated threat detection capabilities in Azure Backup—make it possible to bring security “inside” development processes, DevSecOps pipelines, and business continuity plans, shifting the center of gravity toward a more proactive model focused on reducing real-world risk.

The practical recommendation is not to simply be aware of these capabilities, but to embed them into a concrete roadmap: plan ahead for the retirement of Windows Server 2022 on Azure Arc–enabled Azure Kubernetes Service, assess data estate modernization paths, standardize observability across environments, and experiment in a controlled way with the new Azure Copilot agents and Defender’s advanced capabilities. Only in this way will it be possible to turn these innovations into competitive advantage and prepare your organization for the next phase of AI-powered management.

Azure IaaS and Azure Local: announcements and updates (November 2025 – Weeks: 47 and 48)

This blog post series highlights the key announcements and major updates related to Azure Infrastructure as a Service (IaaS) and Azure Local, as officially released by Microsoft in the past two weeks. Last week marked an important milestone with Microsoft Ignite, which brought a wealth of key updates and innovations from Microsoft. To explore the specific developments announced at the conference in these areas, I invite you to read the dedicated article.

Azure

General

Azure Load Testing available in Italy North

Azure Load Testing within Azure App Testing is now generally available in the Italy North region. This fully managed load-testing service enables customers to generate high-scale load and run realistic simulations to assess application performance and resilience. Through a rich dashboard combining client-side and server-side metrics, customers can quickly identify performance bottlenecks and leverage AI-powered actionable insights to optimize their applications. The service integrates seamlessly into CI/CD workflows, enabling automated performance validation as part of release pipelines. Customers can get started without prior knowledge of load-testing tools or reuse their existing Apache JMeter and Locust scripts to accelerate adoption.

Networking

Managed identity support in Network Watcher VNET flow logs, traffic analytics, and packet capture (preview)

In this public preview, Azure Network Watcher adds support for managed identities to VNET flow logs, Traffic Analytics, and packet capture. Traffic Analytics leverages VNET flow logs to aggregate, process, and enrich network flows, providing insights into network activity, visualization, security posture, and performance. Network Watcher packet capture enables the collection of network packets directly from virtual machines, supporting deep network analysis and troubleshooting. With this update, managed identities provided by Microsoft Entra ID allow VNET flow logs and Traffic Analytics to securely access Azure Blob Storage and Log Analytics workspaces without storing or managing credentials. Once managed identity is enabled for Network Watcher components and the appropriate permissions are granted, the managed identity is used to obtain an access token from Microsoft Entra ID to access the configured resources.

Conclusion

Over the past two weeks, Microsoft has introduced a slew of updates and announcements pertaining to Azure Infrastructure as a Service (IaaS) and Azure Local. These developments underscore the tech giant’s unwavering commitment to enhancing its cloud offerings and adapting to the ever-evolving needs of businesses and developers. Users of Azure can anticipate improved functionalities, streamlined services, and enriched features as a result of these changes. Stay tuned for more insights as I continue to monitor and report on Azure’s progression in the cloud sphere.

Azure IaaS and Azure Local: Microsoft Ignite 2025 Special Edition

This post is a special edition of my regular “Azure IaaS and Azure Local: announcements and updates” series, dedicated entirely to the wave of news coming from Microsoft Ignite 2025. As every year, Ignite condenses in a few days an impressive number of announcements across infrastructure, networking, management, AI, and sovereign cloud – so this edition is intentionally focused on helping you navigate what matters most if you work with Azure IaaS and Azure Local in the field.

Rather than attempting to cover every single announcement, I’ve selected the updates that I consider most relevant for architects, IT pros, and cloud practitioners: from networking and observability improvements, to new capabilities in Azure Local, Sovereign Private Cloud, and Microsoft 365 Local, all the way to storage, and hybrid innovations.

For a complete view of everything announced at Ignite, including services and scenarios outside the scope of this post, I strongly recommend reading the official Microsoft Ignite 2025 Book of News, which provides the full catalog of updates, an interactive table of contents, and translation options for global audiences.

Azure

General

Microsoft Sovereign Cloud: continuous innovation

Alongside the many Azure product updates, Microsoft is also pushing forward on the Microsoft Sovereign Cloud vision, with new capabilities across AI, security, and productivity, plus a roadmap of features specifically targeting sovereign cloud needs.

Microsoft emphasizes that sovereignty is not a one-off project but an area of continuous innovation, and several concrete commitments have already moved into execution. As of this month, Microsoft has:

  • Established a European board of directors made up of European nationals, responsible for overseeing all datacenter operations in line with European law – effectively placing Europe’s cloud infrastructure in European hands.
  • Expanded European datacenter capacity, with new regions launched in Austria and another coming online in Belgium this month.
  • Embedded digital resiliency commitments into all relevant government contracts, making resilience and continuity guarantees part of the core commercial framework.
  • Increased investment in open source, by funding secure OSS projects and collaborations, and by publishing AI Access Principles that broaden safe, responsible access to advanced AI so European developers, startups, and enterprises can compete more effectively.
  • Advanced the European Security Program, providing AI-powered threat intelligence and cybersecurity capacity-building initiatives to strengthen Europe’s digital resilience against sophisticated threat actors.

Taken together, these steps underscore that the Sovereign Cloud strategy is not just about where data is stored, but also about governance, resilience, open innovation, and security capabilities tailored to regional expectations and regulations.

Networking

ExpressRoute Scalable Gateway

The new ExpressRoute Scalable Gateway (ErGwScale) Virtual Network Gateway SKU is now generally available. It offers ExpressRoute connectivity with bandwidth up to tens of Gbps and supports flexible scaling via scale units, so you can adjust performance to match your workload without recreating the gateway. This simplifies high-bandwidth hybrid connectivity scenarios and improves both reliability and cost control compared to traditional gateway SKUs.

Azure Virtual Network Manager address overlap prevention in mesh

Address overlap prevention for mesh topologies in Azure Virtual Network Manager is now generally available. The service automatically checks that the address spaces of virtual networks included in a mesh do not overlap, and blocks configurations that would cause ambiguous routing or dropped traffic. This improves reliability and simplifies governance of large-scale multi-VNet architectures.

TLS and TCP termination on Azure Application Gateway

Azure Application Gateway now supports general availability of TLS and TCP termination, extending scenarios beyond traditional HTTP(S) workloads. The gateway can front and load balance applications that expose custom TCP/TLS protocols, centralizing certificate and security policy management on the gateway instead of on each backend. This simplifies designs where you want a single entry point for both web and non-HTTP traffic targeting your applications.

Application Gateway for Containers – Slow start

The slow start load-balancing algorithm for Application Gateway for Containers is now generally available. When new pods or backend instances are added to a pool, traffic is ramped up gradually over a configurable warm-up period instead of being sent at full volume immediately. This helps avoid overloading freshly started pods, leads to smoother scale-out events, and reduces transient errors when applications need some time to become fully responsive after startup.

[In preview] – Application Gateway for Containers Istio Service Mesh integration

Application Gateway for Containers introduces, in public preview, integration with Istio via an optional service mesh extension. In this model the gateway acts as the north–south ingress for the mesh: it terminates external traffic, applies advanced L7 inspection and routing, and securely forwards traffic to services managed by Istio. This lets you combine the strengths of a service mesh (policies, observability, mTLS inside the cluster) with the enterprise-grade capabilities of an L7 application gateway at the edge.

[In preview] – Azure Network Watcher – Agentless Connection Troubleshoot

Azure Network Watcher’s Connection Troubleshoot feature now offers a fully agentless mode in public preview. You no longer need to install agents or VM extensions to run connectivity tests: diagnostics can be launched directly from the portal against the selected endpoints, validating NSG rules, effective routes, and reachability. This reduces operational overhead and significantly speeds up network troubleshooting between Azure resources.

[In preview] – Microsoft HTTP DDoS Ruleset 1.0 on Application Gateway WAF v2

Microsoft is releasing the Microsoft HTTP DDoS Ruleset 1.0 in public preview for Application Gateway WAF v2. This rule set is designed to mitigate HTTP layer DDoS attacks and malicious botnet traffic, going beyond static signatures with more behavioral and heuristic analysis of requests. It strengthens protection for web apps exposed via Application Gateway, typically without requiring major changes to existing WAF policies.

[In preview] – Azure Network Watcher Topology – AKS Visualization

The Network Watcher Topology view now extends to Azure Kubernetes Service (AKS) clusters. In preview you can see AKS nodes and their related networking resources, together with the topological relationships, directly inside the Azure networking experience. This makes it easier to investigate connectivity issues or misconfigurations affecting containerized workloads, without constantly switching between AKS blades, network resources, and external tools.

[In preview] – Azure VNet Flow Log – Filtering

Azure VNet Flow Logs, which capture IP traffic traversing virtual networks, subnets, and NICs, now introduce advanced filtering in public preview. You can limit logging to specific IP ranges, ports, directions, or traffic patterns and export only the flows that matter for your scenario. This helps reduce log volume (and cost) while preserving the necessary visibility for monitoring, troubleshooting, performance tuning, security analytics, and compliance.

[In preview] – Cross region pool association support for Azure Virtual Network Manager IP address management

Azure Virtual Network Manager’s IP Address Management (IPAM) feature adds public preview support for associating IP pools across regions. You can now define global IP pools and reuse them in different regions, while keeping centralized control over address uniqueness and alignment with corporate standards. This is particularly valuable for distributed, multi-region environments where manual management of address spaces becomes error-prone and difficult to audit.

[In preview] – Standard V2 NAT Gateway and StandardV2 Public IPs

New StandardV2 NAT Gateway and StandardV2 Public IP SKUs are available in public preview as the next generation outbound connectivity options for Azure. They provide higher scalability and resiliency, including zone-redundant designs in regions with Availability Zones, improving high availability for SNAT traffic to the Internet. These SKUs modernize outbound connectivity patterns from virtual networks and are better suited for large-scale, mission-critical workloads.

Storage

Azure NetApp Files single file restore from backup

Azure NetApp Files now supports single file restore from backup, generally available in all ANF-supported regions. Instead of restoring an entire volume just to recover a few items, you can restore individual files directly from the Azure NetApp Files backup vault. This significantly reduces both the time and cost of recovery operations and makes ANF backups much more practical for everyday “oops” scenarios like accidental deletes or small-scale data corruption.

[In preview] – Azure NetApp Files migration assistant (portal support)

The Azure NetApp Files migration assistant, based on SnapMirror, is now in public preview and available directly in the Azure portal. It leverages ONTAP’s built-in replication engine to deliver efficient, cost-effective data migration from on-premises ONTAP or Cloud Volumes ONTAP/other cloud providers to Azure NetApp Files.

The goal is to accelerate and simplify migrations of business-critical applications and datasets to Azure, while minimizing disruption. Key benefits include:

  • Storage-efficient data transfer that reduces network transfer costs for both the initial baseline and incremental updates.
  • Low cutover/downtime window, enabling fast and efficient final syncs so you can switch production workloads with minimal impact on users.
  • Integrated data protection and metadata preservation: migrations include source volume snapshots for primary data protection, and preserve directory and file metadata to maintain security attributes and access control.

[In preview] – Azure NetApp Files cache volumes

Azure NetApp Files cache volumes are now available in public preview. Built on NetApp ONTAP FlexCache technology, this feature provides a persistent, high-performance cache in Azure for data stored on ONTAP-based storage volumes outside Azure NetApp Files.

By caching active (“hot”) data closer to users and cloud workloads, organizations can dramatically improve data access latency and throughput over WAN links. Practically, this lets you:

  • Burst large on-premises datasets into Azure with near-local performance.
  • Support compute-heavy workloads in Azure that rely on data hosted elsewhere.
  • Enable globally distributed teams to collaborate on shared datasets without slow file transfers or manual data copies.

It’s particularly compelling for HPC, media & entertainment, engineering, and analytics scenarios where large shared datasets need to be accessed quickly from Azure without fully relocating the primary data.

[In preview] – Smart Tier account level tiering (Azure Blob Storage and ADLS)

Smart Tier introduces, in public preview, account-level automatic tiering for Azure Blob Storage and Azure Data Lake Storage (ADLS). Instead of manually moving data between tiers (hot, cool, archive, and so on), the service continuously analyzes access patterns and places objects in the most cost-effective tier, balancing cost and performance. The target is to reduce operational effort and optimize storage spend, especially in environments with large volumes of historical or infrequently accessed data.

[In preview] – Entra-only identities support with Azure Files SMB

Azure Files now supports Entra-only identities for SMB access in public preview. With Microsoft Entra Kerberos, users and groups defined only in the Entra tenant (with no on-premises Active Directory or hybrid sync) can authenticate directly to Azure Files shares. This enables fully cloud-native scenarios: you can retire dedicated domain controllers for these workloads, simplify identity infrastructure, and support solutions like Azure Virtual Desktop with FSLogix using cloud-only accounts.

Azure Local

New Sovereign Private Cloud and AI capabilities

As organizations double down on digital sovereignty, they need to balance strict regulatory requirements with the freedom to innovate. Azure Local continues to evolve in this direction, combining advanced AI capabilities with scalable infrastructure that can run in both public and fully private environments—giving governments, regulated industries, and multinational enterprises more control over where and how their data is processed.

Supporting thousands of AI models on Azure Local with NVIDIA RTX GPUs

To advance its Sovereign Private Cloud story with Azure Local, Microsoft is introducing a new Azure offering based on the latest NVIDIA RTX Pro 6000 Blackwell Server Edition GPU, purpose-built for high-performance AI workloads in sovereign environments.

This GPU is designed to run more than 1,000 AI models, including GPT OSS, DeepSeek-V3, Mistral NeMo, and Llama 4 Maverick, so organizations can accelerate their AI initiatives directly inside a sovereign private cloud. Customers gain the flexibility to experiment, build, and deploy advanced AI solutions with improved performance while maintaining strict control over data protection and compliance.

In addition, customers can tap into thousands of prebuilt and open-source AI models, ready to deploy across scenarios such as generative AI, advanced analytics, and real-time decision making. The combination of powerful GPU infrastructure and a rich model catalog makes it easier to move from experimentation to production while keeping governance and sovereignty front and center.

Increasing Azure Local scale to hundreds of servers

Historically, Azure Local supported single clusters of up to 16 physical servers. With the latest updates, Azure Local can now scale to hundreds of servers per deployment, opening up new options for organizations with large or fast-growing sovereign private cloud needs.

This increased scale allows customers to run bigger, more complex workloads, expand capacity as demand grows, and consolidate more services into a single Azure Local footprint. All of this can be done while remaining aligned with the security, compliance, and sovereignty requirements set by European and global regulators.

SAN support on Azure Local

A key part of expanding Sovereign Private Cloud scale is the introduction of Storage Area Network (SAN) support for Azure Local. Customers can now securely connect existing on-premises SAN solutions from leading storage vendors to Azure Local deployments.

This integration enables organizations to reuse their established storage investments, while taking advantage of Azure Local’s cloud-native services and operational model. Data can stay within the required jurisdiction, helping European enterprises and other regulated customers meet local data residency mandates without giving up performance, resilience, or control.

Microsoft 365 Local: General availability of key workloads

Another important milestone is the general availability of Microsoft 365 Local on Azure Local. Core productivity workloads—Exchange Server, SharePoint Server, and Skype for Business Server—can now run natively on Azure Local.

Starting in December, customers will be able to deploy these workloads in a connected mode, benefiting from Azure Local’s unified management plane and consistent Azure APIs. A fully disconnected option—for customers requiring complete isolation—is planned for early 2026.

This approach lets organizations keep familiar collaboration tools while running them inside a sovereign private cloud environment, maintaining operational control and aligning with stringent compliance and data residency requirements.

Disconnected operations: General availability

Microsoft’s Sovereign Private Cloud offering, powered by Azure Local, is designed for organizations with the strictest compliance, control, and isolation requirements. As part of this, Microsoft is introducing the upcoming general availability of disconnected operations.

Available in early 2026, disconnected operations will allow customers to:

  • Run a fully on-premises control plane, independent from the public Azure control plane.
  • Manage multiple Azure Local clusters from the same local control plane.
  • Operate their private cloud environments securely and independently, within their own facilities or dedicated locations.

This capability is aimed at government agencies, multinational enterprises, and highly regulated or edge scenarios where connectivity to the public cloud may be limited, intermittent, or intentionally restricted. With disconnected operations, customers can maintain business continuity and operational resilience while still benefiting from the same platform consistency and innovation cadence they expect from Azure.

Conclusion

Microsoft Ignite 2025 clearly shows that Azure IaaS and Azure Local are evolving along three main axes: AI at scale, sovereign cloud and compliance-by-design, and operational maturity across different areas. From new capabilities in Azure Local and Microsoft 365 Local, to more advanced observability, networking features, and data services, the common thread is giving organizations more control over where workloads run, how data is governed, and how quickly they can turn innovation into production.

As always, the real value of these announcements comes from mapping them to your roadmap: which features help you modernize existing workloads, which ones enable new scenarios (for example sovereign AI, disconnected operations, or large-scale hybrid deployments), and which should be piloted first. This post has focused on the updates most relevant to Azure IaaS and Azure Local, but if you want to go deeper or explore adjacent areas like developer tools or data & AI platforms, the Microsoft Ignite 2025 Book of News remains the best companion to continue your exploration.

Azure IaaS and Azure Local: announcements and updates (November 2025 – Weeks: 45 and 46)

This blog post series highlights the key announcements and major updates related to Azure Infrastructure as a Service (IaaS) and Azure Local, as officially released by Microsoft in the past two weeks.

Azure

General

Azure MCP Server

Azure MCP Server is now generally available, bringing the power of the cloud directly into agent-based and AI-driven workflows while redefining how developers interact with Azure. Built on the Model Context Protocol (MCP), it establishes a secure, standards-based bridge between Azure services—such as Azure Kubernetes Service (AKS), Azure Container Apps (ACA), App Service, Cosmos DB, Azure SQL, Azure AI Foundry, and Microsoft Fabric—and AI-powered tools like GitHub Copilot. By enabling agents to securely access and operate on these services, Azure MCP Server helps eliminate context switching, streamline development and operations tasks, and accelerate innovation. At the same time, it is designed with enterprise-grade security and scalability in mind, allowing organizations to confidently integrate AI-driven automation into their Azure environments.

Networking

Three important updates for Azure Virtual Network Manager

Azure Virtual Network Manager (AVNM) is now enriched with three generally available capabilities designed to enhance governance, automation, and compliance at scale. First, the new UseExisting mode for User-Defined Route (UDR) management allows AVNM to detect and append only the necessary routes to an existing route table associated with a subnet, preserving the original route table’s name, resource group, and tags. If no route table is present, AVNM continues to create and manage one as before. This gives customers the flexibility to retain ownership of routing configurations while benefiting from centralized automation. Second, the IP Address Management (IPAM) Pool Association Recommendation feature automatically identifies all virtual networks within an AVNM scope that are not associated with an IPAM pool and recommends the most suitable pool based on longest-prefix matching. Administrators can then bulk associate these virtual networks directly from the Azure portal, reducing manual effort and minimizing address-space conflicts. Third, peering compliance introduces protection for virtual network peerings managed through AVNM topology by preventing unauthorized changes or deletions outside AVNM. Key peering properties can only be modified via AVNM connectivity configurations, ensuring cons

DNS flow trace logs for Azure Firewall

Azure Firewall now supports DNS flow trace logs, a new logging capability that delivers deep, end-to-end visibility into DNS traffic and name resolution paths. Building on existing DNS Proxy functionality, this feature records rich metadata such as query types, response codes, queried domains, upstream DNS servers, and the source and destination IP addresses for each request. With this enhanced telemetry, customers can more effectively troubleshoot application connectivity issues, validate DNS forwarding and custom DNS configurations, and strengthen their security posture through improved auditing and investigations. The capability also provides insights into whether the Azure Firewall DNS cache was used during resolution, enabling teams to better understand performance characteristics and optimize DNS behavior across their environments.

Troubleshooting Azure Firewall using packet capture

Azure Firewall now supports packet capture as a generally available capability to help customers troubleshoot network issues with greater precision. Packet capture is designed to record specific traffic flows, which can be filtered based on parameters such as protocol, flags, and custom filters, allowing teams to focus on the most relevant data for their investigations. Administrators can initiate packet captures directly from the Azure portal for an interactive experience, or automate and script the process using PowerShell for repeatable diagnostics in larger environments. By analyzing the captured packets, network and security teams can more easily identify misconfigurations, connectivity problems, or anomalous traffic patterns, accelerating root-cause analysis and improving the overall reliability and security of their Azure Firewall deployments.

Azure WAF JavaScript challenge on Azure Front Door

Azure Web Application Firewall (WAF) on Azure Front Door now offers a JavaScript (JS) challenge as a generally available security feature, designed to enhance bot mitigation without impacting user experience. The JS challenge runs silently in the background to distinguish legitimate clients from malicious automated traffic, avoiding the friction and user interaction typical of CAPTCHA-based approaches. Malicious bots that fail the challenge are blocked, helping protect web applications from automated attacks such as credential stuffing, scraping, and abuse of exposed endpoints. At the same time, legitimate users experience seamless access with no interruptions. The JS challenge is available as a mitigation action within both the Bot Managed ruleset and custom rules, giving security teams flexibility to integrate it into existing WAF policies and tailor protections to their specific application scenarios.

Application Gateway for Containers with Web Application Firewall

Azure Web Application Firewall (WAF) support for Application Gateway for Containers is now generally available, bringing advanced web protection to containerized application workloads. Application Gateway for Containers represents the next evolution of Application Gateway combined with Application Gateway Ingress Controller, and with integrated WAF it can now safeguard workloads against a broad range of web-based attacks, including SQL injection, cross-site scripting, and protocol anomalies. By enabling WAF, customers gain access to Azure-managed Default Rulesets (DRS), which provide protection not only against threats identified by the Open Web Application Security Project (OWASP), but also additional signatures curated by Microsoft’s Threat Intelligence Center (MSTIC). Furthermore, users can take advantage of bot protection via bot manager rulesets and apply rate limiting custom rules to help mitigate distributed denial-of-service (DDoS) style behaviors at the application layer, enhancing both security and resilience for container-based applications.

ExpressRoute resiliency

ExpressRoute resiliency capabilities are now generally available, offering customers deeper insights into and validation of the reliability of their hybrid connectivity. At the core of this enhancement is resiliency insights, an assessment feature that calculates a resiliency index—a percentage score derived from factors such as route resilience, use of zone-redundant gateways, adherence to advisory recommendations, and the results of resiliency validation tests. This index evaluates the control plane resiliency of ExpressRoute connectivity between Azure Virtual Network Gateways and on-premises networks, helping organizations identify gaps and strengthen their architecture. Complementing this, resiliency validation enables customers to perform site failovers for their Virtual Network Gateways, simulating site outages and migration scenarios to test failover effectiveness. By proactively assessing and improving their resiliency index and running validation tests, customers can enhance the robustness of their ExpressRoute connectivity and better ensure continuous access to Azure workloads.

Monitoring end-to-end ExpressRoute connectivity with Connection Monitor

Monitoring integration for ExpressRoute with Connection Monitor is now generally available, simplifying end-to-end observability for hybrid network workloads. With this capability, customers can enable Connection Monitor directly during the creation or update of their ExpressRoute connections, eliminating the need for separate monitoring configuration steps. Once enabled, Connection Monitor provides continuous visibility into connectivity health, latency, and reachability across ExpressRoute paths, offering actionable insights into the performance and reliability of on-premises-to-Azure connectivity. By activating monitoring from day one, organizations can more quickly detect issues, validate the behavior of their network architecture, and maintain a consistently high level of service for critical applications that rely on ExpressRoute.

Storage

Object Replication Priority Replication for Azure Blob

Object Replication Priority Replication for Azure Blob is now generally available, enabling users to obtain prioritized replication from the source to the destination storage account defined in their replication policy. When priority replication is enabled, and both the source and destination accounts are located within the same continent, customers benefit from a Service Level Agreement (SLA) that guarantees 99.0% of operations are replicated from the source container to the destination container within 15 minutes over the billing month. This capability offers organizations greater assurance that their data is replicated quickly and consistently, supporting scenarios that require tighter recovery point objectives, more predictable cross-account synchronization, and stronger safeguards for business-critical workloads.

Geo Priority Replication for Azure Blob

Geo Priority Replication for Azure Blob is now generally available, enhancing the replication experience for Geo-Redundant Storage (GRS) and Geo-Zone-Redundant Storage (GZRS) accounts by accelerating data replication between primary and secondary regions. This feature is backed by a Service Level Agreement (SLA) that ensures the Last Sync Time for Block Blob data remains at 15 minutes or less for 99.0% of the billing month. By providing a predictable upper bound on replication lag, Geo Priority Replication strengthens confidence in data durability and availability, particularly in scenarios where an unexpected outage in the primary region may trigger a failover. Organizations can rely on this capability to maintain a more up-to-date replica of their data in the secondary region, improving their resilience posture and readiness for regional disruptions.

Ultra Disk’s new flexible provisioning model

The new flexible provisioning model for Azure Ultra Disk is now generally available, giving customers greater control over performance and cost optimization for demanding workloads. With this enhancement, users can configure disk capacity, IOPS, and throughput (MBps) more independently, rather than being constrained by fixed performance tiers. This flexibility allows organizations to right-size performance characteristics to match specific application requirements, whether they are optimizing for latency-sensitive databases, high-throughput analytics, or transaction-heavy workloads. The new model applies to both new and existing Ultra Disks, enabling customers to adjust current deployments without re-architecting their infrastructure, and helping them achieve an improved balance between performance and total cost of ownership.

Object Replication Metrics for Azure Blob Storage

Object Replication metrics for Azure Blob Storage are now generally available in all regions, giving customers deeper visibility into the progress and health of their replication workflows. These metrics introduce two key indicators: Pending Operations, which tracks the total number of operations awaiting replication from the source to the destination storage account, and Pending Bytes, which tracks the total volume of data still pending replication. Both metrics are emitted in time buckets (for example, <5 minutes, 5–10 minutes, 10–15 minutes), showing how long operations have been waiting to replicate. This granular view helps organizations quickly identify delays in the replication pipeline, optimize performance, and maintain high availability across their Object Replication policies by proactively responding to emerging bottlenecks.

Planned Failover for Azure Storage

Planned Failover for Azure Storage is now generally available, enabling customer-managed failover of geo-redundant storage accounts while preserving geo-redundancy and data durability. With this capability, organizations can seamlessly swap the primary and secondary endpoints of a geo-redundant account so that, after failover, all new write operations target the original secondary region, which becomes the new primary. This feature supports scenarios such as disaster recovery drills, partial outages where storage remains healthy, and proactive preparation for potential disasters. Planned Failover is available for GPv2 storage accounts and is compatible with Blob, Azure Data Lake Storage Gen2, Table, File, and Queue data, giving customers a consistent mechanism to validate and execute controlled failovers across a broad range of storage workloads.

Azure NetApp Files Object REST API (preview)

The Azure NetApp Files Object REST API, currently in public preview, introduces an S3-compatible REST interface that bridges traditional file-based storage with modern cloud-native services. By exposing object-style access on top of Azure NetApp Files, this capability allows customers to reuse existing datasets with new consumption patterns, including native S3 access from modern applications and integration with other Azure services. In particular, it enables scenarios such as direct integration with Microsoft Fabric and Azure AI services, helping organizations unlock new analytics and AI-driven use cases without restructuring their storage architecture. As a result, customers can reduce costs, accelerate innovation, and derive more value from their existing data and storage investments while evaluating this new capability during the preview phase.

Conclusion

Over the past two weeks, Microsoft has introduced a slew of updates and announcements pertaining to Azure Infrastructure as a Service (IaaS) and Azure Local. These developments underscore the tech giant’s unwavering commitment to enhancing its cloud offerings and adapting to the ever-evolving needs of businesses and developers. Users of Azure can anticipate improved functionalities, streamlined services, and enriched features as a result of these changes. Stay tuned for more insights as I continue to monitor and report on Azure’s progression in the cloud sphere.

Azure Hybrid Management & Security: What’s New and Insights from the Field – October 2025

Once again this month, I’m back with my recurring series focused on the evolution of Azure management and security services, with a special focus on hybrid and multicloud scenarios enabled by Azure Arc and enhanced by the use of Artificial Intelligence.

This monthly series aims to:

  • Provide an overview of the most relevant updates released by Microsoft;

  • Share operational tips and field-proven best practices to help architects and IT leaders manage complex and distributed environments more effectively;

  • Follow the evolution towards a centralized, proactive, and AI-driven management model, in line with Microsoft’s vision of AI-powered Management.

The main areas addressed in this series, together with the corresponding tools and services, are described in this article.

Hybrid and multicloud environment management

Azure Arc

Microsoft recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Distributed Hybrid Infrastructure

Microsoft has once again been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Distributed Hybrid Infrastructure, for the third consecutive year, confirming the value delivered in running workloads across hybrid, edge, multicloud, and sovereign scenarios with Azure. At the heart of this result is Azure’s adaptive cloud approach, built on Azure Arc and Azure Local: the former extends Azure controls—through Azure Resource Manager—to on-premises, edge, and multicloud environments, enabling services such as Azure Kubernetes Service (AKS, Azure Kubernetes Service), Microsoft Defender for Cloud, Azure IoT Operations, and Azure AI Video Indexer; the latter brings Azure services and management into customer-owned environments, allowing local execution of cloud-native workloads, including virtual machines and Arc-enabled AKS clusters, and supporting the Sovereign Private Cloud strategy for isolated and compliant operations while maintaining consistency with Azure.

Firmware analysis enabled by Azure Arc

The firmware analysis capability enabled by Azure Arc is now available. The service provides deep visibility into the software powering Internet of Things (IoT, Internet of Things)/Operational Technology (OT, Operational Technology) devices and network appliances—systems often treated as “black boxes” with limited transparency into their security posture.
Users upload the device’s firmware image and receive a detailed report generated by automated security analysis, useful for identifying vulnerabilities, outdated components, and compliance risks in hybrid and multicloud environments governed with Arc.

Security posture across hybrid and multicloud infrastructures

Microsoft Defender for Cloud

New features, bug fixes, and deprecated features of Microsoft Defender for Cloud

The development of Microsoft Defender for Cloud is constantly evolving, with continuous improvements being introduced. To stay updated on the latest developments, Microsoft updates this page, which provides information on new features, bug fixes, and deprecated features. Specifically, this month’s main news includes:

  • Outbound network requirements update for Microsoft Defender for Containers: Microsoft has updated the outbound network requirements for the Microsoft Defender for Containers sensor. The change affects all subscriptions using the sensor. Effective immediately, the sensor must be able to reach the Fully Qualified Domain Name (FQDN, Fully Qualified Domain Name) *.cloud.defender.microsoft.com on port 443 over the HTTPS protocol. It is recommended to add this FQDN (and related port) to your outbound restriction mechanisms—such as proxies or firewalls. If egress traffic from clusters is not blocked, no changes are required. To validate connectivity to Defender for Containers endpoints, you can run the dedicated test script from the cluster. To avoid service disruptions, any changes on Google Kubernetes Engine (GKE, Google Kubernetes Engine) and Elastic Kubernetes Service (EKS, Elastic Kubernetes Service) must be completed by September 30, 2026; otherwise, the sensor may not function as expected.
  • Microsoft Defender for Cloud: new permission for the GitHub connector (October 23, 2025). Microsoft Defender for Cloud is updating its GitHub connector to require the new artifact_metadata:write permission, needed to enable artifact attestation capabilities that ensure verifiable build provenance and strengthen software supply-chain security. The permission has a limited scope, aligned with the principle of least privilege, to facilitate swift and targeted approvals.

Backup & Resilience

Azure Backup

Vaulted Backup for Azure Data Lake Storage (preview)

Public Preview is available for Vaulted Backup for Azure Data Lake Storage (ADLS, Azure Data Lake Storage), extending in-vault protection to this service as well. The solution maintains an independent copy isolated from the source account to ensure business continuity and compliance, with restores to original or alternate accounts even in cases of accidental deletions, insider threats, or ransomware.
The solution includes flexible scheduling (daily/weekly and on-demand), long-term retention up to 10 years, and a security-first design with soft delete, immutability, encryption, and multi-user authorization to protect data in the vault.

Azure Site Recovery

Azure Site Recovery: support for Ultra Disks on virtual machines

Microsoft announces General Availability of support in Azure Site Recovery (ASR, Azure Site Recovery) for virtual machines with Ultra Disks, enabling organizations of any size to replicate, fail over, and fail back across Azure regions with minimal impact on production performance. The solution offers automated recovery orchestration, cost-optimized replication, and non-disruptive testing, helping companies increase operational resilience, meet compliance requirements, and minimize downtime. With this release, teams can reliably extend enterprise-grade protection and continuity to workloads using Ultra Disks. Ultra Disks are the highest-performance block storage option for Azure VMs, with consistent sub-millisecond latency and extremely high performance; they are therefore ideal for a broad range of mission-critical workloads, such as SAP High-Performance Analytic Appliance (HANA, High-Performance Analytic Appliance), high-end databases, and highly transactional systems that demand maximum performance.

Monitoring

Azure Monitor

Retirement of legacy authentication in Azure Monitor – Container Insights (deadline: September 30, 2026)

Microsoft will retire legacy authentication in Azure Monitor – Container Insights starting September 30, 2026. The model is being replaced by authentication via Managed Identity, which is more modern and secure and also enables capabilities not previously available, such as Syslog collection and High Scale mode.
Customers must migrate to Managed Identity by the specified date: the transition can be easily performed from the Azure portal or via CLI/PowerShell, along with bulk migration scripts provided in the official guidance.

Conclusions

The October 2025 updates outline a consistent path in the maturation of Azure’s adaptive cloud, where Azure Arc and Azure Local uniformly extend control and operational consistency across datacenters, edge, and multicloud. Microsoft’s recognition as a Leader in the 2025 Gartner® Magic Quadrant™ for Distributed Hybrid Infrastructure confirms this trajectory, highlighting an ecosystem capable of uniting governance, security, and data sovereignty. Within this framework, Arc-enabled firmware analysis introduces transparency into traditionally opaque IoT/OT domains; updates to Microsoft Defender for Cloud and Defender for Containers strengthen supply-chain integrity and security posture; Vaulted Backup for Azure Data Lake Storage (preview) expands protection options with isolated copies and extended retention; ASR support for Ultra Disks extends operational continuity to the most demanding workloads; and the evolution of Azure Monitor – Container Insights toward Managed Identity marks a further step toward more robust authentication models. Overall, a platform emerges that natively and distributively integrates management, protection, and observability, promoting shared standards and reducing friction across heterogeneous environments.

Azure IaaS and Azure Local: announcements and updates (November 2025 – Weeks: 43 and 44)

This blog post series highlights the key announcements and major updates related to Azure Infrastructure as a Service (IaaS) and Azure Local, as officially released by Microsoft in the past two weeks.

Azure

Compute

RHEL Software Reservations Now Available on Azure with Updated Pricing

Red Hat Enterprise Linux (RHEL) software reservations are available again on Azure with updated billing meters and pricing. The revised structure addresses issues present in previous meters and aligns with Red Hat’s current pricing model, improving accuracy and transparency. With clearer pricing visibility and alignment to the latest licensing framework, customers can more easily plan and optimize RHEL deployment costs on Azure—purchasing reservations to reduce operational expenses while retaining enterprise-grade Linux capabilities.

VM vCore customization features disabling simultaneous multi-threading (SMT/HT) and constrained cores (preview)

Azure announces public preview of Virtual Machine (VM) customization features that provide granular control over virtual CPU (vCPU) configurations to optimize performance and licensing. Customers can disable Simultaneous Multi-Threading (SMT, also known as Intel Hyper-Threading (HT)) to run with one thread per core for latency-sensitive or single-threaded workloads, and select a custom vCPU count from validated options to lower per-vCPU licensing costs while preserving full memory, storage, and I/O bandwidth. The capabilities are available across a broad set of VM sizes in select regions during preview and can be used independently or together. They are well suited for database and High-Performance Computing (HPC) scenarios, and are accessible through the Azure portal, ARM templates, Azure CLI, and PowerShell.

Sharing Capacity Reservation Groups (preview)

Azure introduces public preview support for sharing Capacity Reservation Groups (CRGs) across subscriptions, expanding beyond the previous limitation of using CRGs only within a single subscription. By enabling on-demand CRGs to be shared, organizations can centralize capacity management, promote resource reuse, scale out more cost-effectively, and separate security responsibilities from capacity planning. This enhancement simplifies governance for enterprises operating multiple subscriptions while maintaining reserved capacity for planned Virtual Machine (VM) deployments.

Networking

Enhanced cloning and Public IP retention scripts for Azure Application Gateway migration

Azure Application Gateway provides two production-ready PowerShell scripts to accelerate migration from V1 (Standard or Web Application Firewall (WAF)) to V2 (Standard_V2 or WAF_V2). The cloning script automates end-to-end configuration replication—including front-end Transport Layer Security (TLS) and trusted root certificates—and supports private-only V2 gateways, while the Public IP retention script allows the existing V1 public IP to be preserved on the V2 gateway. With V1 retirement set for April 2026, these tools reduce downtime, minimize manual steps, and de-risk large-scale cutovers.

Azure WAF CAPTCHA Challenge for Azure Front Door

Azure Front Door now offers General Availability of a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) challenge within Azure Web Application Firewall (WAF). This feature adds an adaptive, interactive layer to existing defenses—such as IP blocking and rate limiting—to distinguish legitimate users from automated traffic in real time. By verifying human interaction before granting access, the CAPTCHA challenge strengthens bot mitigation strategies and helps organizations protect web applications from scrapers, brute-force attempts, and other automated attacks.

High Scale Private Endpoints

Microsoft has introduced High Scale Private Endpoints (HSPE) to raise Azure Private Endpoint (PE) limits within a single Azure Virtual Network (VNet). Previously, VNets were capped at 1,000 private endpoints, and attempts to exceed that threshold triggered a PrivateEndpointsPerVnetLimitReached error that required deleting endpoints or opening a support request. With HSPE enabled, organizations can deploy up to 5,000 private endpoints in one VNet. Microsoft also recommends keeping the cumulative total across peered VNets to 4,000 to avoid potential connectivity issues; upgrading to HSPE lifts the cross-peering guideline to 20,000 endpoints. In addition, Azure Virtual Network Manager (AVNM) support for HSPE in mesh (connected groups) is now generally available, allowing enterprises to scale private connectivity across large, interconnected topologies with minimal complexity.

Storage

Cloud-to-Cloud migration made simple with Azure Storage Mover

Azure Storage Mover now offers a generally available Amazon Web Services (AWS) Simple Storage Service (S3) to Azure Blob Storage migration path, enabling direct, secure, and scalable cloud-to-cloud data transfers. As a fully managed service, it removes infrastructure overhead while delivering high, parallelized throughput for large datasets across regions or storage accounts. For cloud-to-cloud scenarios, no on-premises agent is required, simplifying setup and operations. Customers can automate end-to-end migrations in the Azure portal and gain real-time visibility into job status, eliminating the need for manual pipelines or third-party tooling.

Azure Storage Mover support for NFS source to Azure File Share (NFS 4.1) target

Azure Storage Mover now supports migrating Network File System (NFS) shares directly to Azure File Shares using NFS 4.1. The fully managed service enables organizations to move on-premises files and folders to Azure Storage with minimal downtime, leveraging just-in-time permission setting and Azure Key Vault to keep data protected end-to-end. In addition to the generally available capabilities—such as migrating from an on-premises NFS share to an Azure Blob container and from Server Message Block (SMB) sources to Azure File Shares or Azure Blob containers—this update adds NFS source to Azure File Shares (NFS 4.1) as a supported target, expanding options for secure and streamlined file migrations.

Instant Access Snapshots for Azure Premium SSD v2 and Ultra Disks (preview)

Microsoft has announced Public Preview of Instant Access Snapshots for Premium SSD v2 (Pv2) and Ultra Disks, enabling new disks to be restored immediately after a snapshot is created. Restored disks deliver full performance instantly while data hydration completes rapidly in the background. This capability accelerates common workflows such as taking instant backups before software updates for quick rollback, rapidly scaling stateful applications by cloning primary data for new instances (for example, adding read-only Microsoft SQL Server replicas), and performing fast, recurring refreshes of training or testing environments from production.

Azure Local

General

Microsoft named a Leader in the 2025 Gartner® Magic Quadrant™ for Distributed Hybrid Infrastructure

Microsoft has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Distributed Hybrid Infrastructure for the third consecutive year. The recognition reflects Azure’s adaptive cloud approach, centered on Azure Arc and Azure Local, which brings the cloud operating model to datacenters, edge, multicloud, and sovereign environments. Azure Arc extends Azure management and governance—via Azure Resource Manager—to any infrastructure and enables services such as Azure Kubernetes Service (AKS), Microsoft Defender for Cloud, Azure IoT Operations, and Azure AI Video Indexer. Azure Local builds on Azure Arc to run cloud-native workloads, including virtual machines and Arc-enabled AKS, in customer-owned environments while supporting Microsoft’s Sovereign Private Cloud strategy. Together, these capabilities provide unified governance, security, and management across distributed estates, helping organizations innovate, remain secure, and scale with confidence.

Azure Local 2510 release

Microsoft has released Azure Local 2510, a milestone update that resolves 437 bugs and delivers multiple features aimed at improving performance, resilience, and operational efficiency. The release expands upgrade eligibility (11.2510/23H2 to 12.2510/24H2) for all customers without opt-in, and advances partner lifecycle consistency through SBE 5.0 support in the 2-Tier Program, raising the bar on capabilities like download, health checks, threat modeling, and custom Cluster-Aware Updating (CAU) plugins.

Ability to inject Hotfix during Deploy

The 2510 release adds the ability to inject hotfixes into deployment packages, allowing post-release fixes to be applied as part of a fresh deploy. This shortens time-to-resolution, reduces repeat incidents across customers, and lowers support overhead. Microsoft has already scheduled two hotfix waves for 2510 to improve reliability across deployment and upgrade paths.

Deployment using Local Identity (preview)

Azure Local now supports “AD-less” deployment using local identities. This approach reduces external dependencies for edge scenarios by using local accounts to set up the cluster. Node-to-node communications authenticate via certificates, while sensitive node secrets such as BitLocker keys are stored securely in Azure Key Vault, simplifying initial rollout without sacrificing security.

Enable upgrade to 12.2510 (24H2)

Beginning with this release, customers running solution version 11.2510 (23H2) can upgrade directly to 12.2510 (24H2). The broadened availability removes prior opt-in requirements, streamlining planning and enabling faster access to new capabilities.

SBE 5.0 support for 2-Tier Program

Azure Local 2510 introduces support for SBE 5.0 packages across both tiers of the program. By requiring all tiers—not only premier solutions—to meet key SBE capabilities (download, health checks, threat modeling, and custom CAU plugins), the release standardizes and strengthens lifecycle management, delivering a consistent, secure, and scalable experience.

Compute

Rack Aware Cluster (preview)

Rack-aware clustering enables customers to define local availability zones that map to physical racks within their datacenter. By spreading roles and data across rack boundaries, the feature increases fault tolerance and reduces the risk of downtime or data loss from a single rack failure.

Trusted Virtual Machine Guest Attestation (preview)

Trusted VM Guest Attestation allows customers to verify that a VM boots into a known-good state by validating the integrity of the full boot chain—including firmware, boot loader, and drivers. This preview enhances supply-chain and platform trust by detecting unexpected changes before workloads run.

KMSv2 encryption for AKS-HCI clusters

KMS v2 replaces the deprecated KMS v1 (in Kubernetes v1.28) and is enabled by default for new AKS-HCI clusters. The change improves security posture and operational continuity for edge environments with no workload disruption during cluster creation, while providing automatic key rotation and stronger compliance readiness.

Kubernetes v1.32 support on AKS Arc

Azure Local 2510 enables deployment of AKS Arc clusters running Kubernetes v1.32. The update delivers the latest upstream capabilities and performance improvements, helping customers maintain feature parity and modern security baselines across Arc-managed Kubernetes estates.

Networking

Software Defined Network with Network Security Groups

Software Defined Network (SDN) with Network Security Groups (NSGs) is now generally available for Azure Local. Customers can create and manage NSGs and granular security rules for Azure Local virtual machines, enabling improved segmentation, consistent policy enforcement, and defense-in-depth across on-premises deployments.

Conclusion

Over the past two weeks, Microsoft has introduced a slew of updates and announcements pertaining to Azure Infrastructure as a Service (IaaS) and Azure Local. These developments underscore the tech giant’s unwavering commitment to enhancing its cloud offerings and adapting to the ever-evolving needs of businesses and developers. Users of Azure can anticipate improved functionalities, streamlined services, and enriched features as a result of these changes. Stay tuned for more insights as I continue to monitor and report on Azure’s progression in the cloud sphere.

Azure IaaS and Azure Local: announcements and updates (October 2025 – Weeks: 41 and 42)

This blog post series highlights the key announcements and major updates related to Azure Infrastructure as a Service (IaaS) and Azure Local, as officially released by Microsoft in the past two weeks.

Azure

General

Azure Integrated HSM (preview)

Azure is releasing Azure Integrated Hardware Security Module (HSM), a built-in HSM cache and cryptographic accelerator designed to improve both security and performance for cryptographic operations within virtual machines. Targeted at crypto-intensive workloads, the feature provides secure key storage with fast, in-boundary retrieval and uses specialized hardware engines for encryption, decryption, signing, and verification while keys remain protected inside the integrated HSM. Azure Integrated HSM is part of the AMD D- and E-series v7 preview, designed to meet Federal Information Processing Standards (FIPS) 140-3 Level 3 requirements, and is available on the Dasv7, Dadsv7, Easv7, and Eadsv7 series with 8 vCores and above. The preview initially supports Windows (Linux support is coming soon) and is offered at no additional cost.

Compute

Retirement of F, Fs, Fsv2, Lsv2, G, Gs, Av2, Amv2, and B-series VMs in 2028

Microsoft has announced that the F, Fs, Fsv2, Lsv2, G, Gs, Av2, Amv2, and B-series Azure Virtual Machines will retire on November 15, 2028, and will no longer be usable or purchasable after that date. Customers should plan migrations of affected workloads to newer VM series to ensure continuity. Three-year reserved instances for these series cannot be purchased or renewed starting November 15, 2025, and one-year reserved instances will not be available for purchase or renewal after November 15, 2027. Existing three-year reservations will continue to provide benefits until their contracted end date; after expiration, usage will be billed at pay-as-you-go rates. Customers are advised to review current reservations to identify impacted VMs and expiration timelines and to plan migration accordingly.

Networking

Prescaling in Azure Firewall

Azure Firewall now supports prescaling, enabling administrators to provision and reserve capacity units ahead of anticipated demand—such as seasonal peaks or planned business events—to maintain consistent throughput, accelerate scaling response, and gain tighter control over capacity. In addition, a new Observed Capacity metric surfaces current and historical capacity usage to inform planning, while flexible billing ensures organizations pay only for the provisioned capacity units and can adjust them as needs evolve. Prescaling is available for Azure Firewall Standard and Premium Stock Keeping Unit (SKU) tiers in all public regions.

Observed capacity metric in Azure Firewall

Azure Firewall introduces the Observed Capacity metric to help teams understand how their firewalls scale in real-world conditions by tracking the number of actively utilized capacity units over time. With this signal, operators can validate that prescaling or autoscaling configurations behave as expected, set proactive alerts as usage approaches defined thresholds, diagnose whether scaling is keeping pace with demand, and forecast future capacity requirements using both historical and current traffic trends.

Azure Firewall updates – Customer-provided public IP address support in secured hubs

Azure Firewall in Virtual WAN secured hubs now supports customer-provided public IP addresses, allowing organizations to “bring their own” IPs already allocated within their Azure subscription. This gives teams greater control over egress identity and simplifies compliance, security policy enforcement, and third-party integrations that depend on stable, preapproved public IPs. Instead of relying on Azure-managed addresses, customers can assign their own, enabling consistent addressing across environments and reducing operational friction.

Azure Firewall updates – IP Group limit increased to 600 per Firewall Policy

Azure Firewall Policy now supports up to 600 IP Groups per policy (previously 200), enabling administrators to better organize large rule sets and reduce rule complexity. With more IP Groups, enterprises managing extensive, segmented networks can model application tiers and subnets more cleanly, while named groups improve readability and speed up troubleshooting and audits by clarifying rule intent in logs and reviews.

Private Link Service Direct Connect (preview)

Azure is introducing Private Link Service Direct Connect, which extends Azure Private Link by allowing a private link service to connect directly to any routable destination IP address—removing the previous requirement to place applications behind a Standard Load Balancer. This enhancement preserves the same private and secure access model while simplifying architectures for publishing services to customers. The limited public preview is initially available in North Central US, East US 2, Central US, South Central US, West US, West US 2, West US 3, Asia Southeast, Australia East, and Spain Central, with additional regions to follow.

Storage

Azure NetApp Files short-term clones

Azure NetApp Files short-term clones are now generally available, providing space-efficient, instant read/write copies created from existing volume snapshots without requiring full data duplication. The clones persist for up to 32 days and consume capacity only for incremental changes, accelerating development, analytics, disaster recovery drills, and testing with large datasets. By enabling rapid refreshes from the latest snapshots and minimizing operational overhead, this capability improves workflow velocity, quality, and cost efficiency across data-intensive scenarios.

Azure Storage Discovery

Azure Storage Discovery delivers enterprise-wide visibility across the Azure Storage data estate, allowing organizations to deeply analyze used capacity and activity, optimize costs, strengthen security posture, and improve operational efficiency. Integrated with Azure Copilot, it lets stakeholders—from cloud architects to storage administrators and data governance leads—unlock insights with natural language prompts and quickly answer questions such as total data stored across all accounts, regions with the fastest growth, and where to reduce costs via tiering adjustments or cleanup of stale data. The service is offered in two plans—Free for basic insights and Standard for full capabilities—and can begin analyzing data across subscriptions within hours, providing some pre-deployment history and up to 18 months of retention to reveal long-term patterns like workload peaks and valleys.

Conclusion

Over the past two weeks, Microsoft has introduced a slew of updates and announcements pertaining to Azure Infrastructure as a Service (IaaS) and Azure Local. These developments underscore the tech giant’s unwavering commitment to enhancing its cloud offerings and adapting to the ever-evolving needs of businesses and developers. Users of Azure can anticipate improved functionalities, streamlined services, and enriched features as a result of these changes. Stay tuned for more insights as I continue to monitor and report on Azure’s progression in the cloud sphere.

Azure IaaS and Azure Local: announcements and updates (October 2025 – Weeks: 39 and 40)

This blog post series highlights the key announcements and major updates related to Azure Infrastructure as a Service (IaaS) and Azure Local, as officially released by Microsoft in the past two weeks.

Azure

Compute

Azure VMware Solution AV36 Node Retirement on June 30, 2028

Microsoft announces the retirement of the AV36 node type for Azure VMware Solution effective June 30, 2028. Existing AV36 Reserved Instance (RI) terms remain unchanged, but customers are advised to review their AV36 RI expiration timelines and coordinate next steps with their Microsoft account teams. To ease the transition, Microsoft will offer AV36 1-year RIs with VCF included until October 15, 2025, and AV36 VCF BYOL 1-year RIs until June 30, 2026 (requiring a portable Broadcom VCF subscription). Existing AV36 Pay-As-You-Go subscriptions will continue through September 30, 2027. This change impacts only AV36; AV36P, AV48, AV52, and AV64 remain available with AVS VCF BYOL options.

Retirement: NVv3-series Azure Virtual Machines will be retired on September 30, 2026

Microsoft will retire the NVv3-series VM sizes—Standard_NV12s_v3, Standard_NV12hs_v3, Standard_NV24s_v3, Standard_NV24ms_v3, Standard_NV32ms_v3, and Standard_NV48s_v3—on September 30, 2026. To avoid disruption, organizations should migrate workloads to newer sizes within the NV product line. Microsoft recommends NVadsA10_v5 VMs, which provide higher GPU memory bandwidth per GPU and are well suited for GPU-accelerated graphics, virtual desktops, visualization workloads, and smaller AI scenarios.

Networking

Using Server-Sent Events with Application Gateway

Azure Application Gateway now supports Server-Sent Events (SSE) in general availability, enabling real-time, server-to-client data streaming over a persistent HTTP connection. To adopt SSE, administrators must apply specific configurations on both the Application Gateway resource and the backend application so that server push updates flow reliably to connected clients.

Retirement: Azure VPN Gateway support for SSTP Protocol will be retired on March 31, 2027

Azure VPN Gateway support for the SSTP protocol will be phased out due to limited scalability and performance. Customers are advised to migrate to IKEv2 or OpenVPN, which provide significantly higher connection limits—up to 10,000 connections—and aggregate throughput up to 10 Gbps depending on the gateway SKU. Key dates include March 31, 2026, when enabling SSTP on VPN gateways will no longer be supported, and March 31, 2027, when existing SSTP-enabled gateways will no longer be able to establish SSTP connections. To avoid disruption, customers should complete migration to IKEv2 or OpenVPN before March 31, 2027.

New health check infrastructure for Azure Traffic Manager

Azure Traffic Manager has introduced new health check infrastructure designed to improve resiliency and horizontal scalability. Customers are being migrated to the new platform, which enhances the reliability of health probes. Because probes originate from updated IP addresses, environments with strict firewall controls should ensure health checks are allowed. The recommended approach is to use the AzureTrafficManager Service Tag in NSGs or Azure Firewall so rules stay current automatically. Where Service Tags are not feasible (such as custom appliances or non-Azure environments), administrators should manually update ACLs or firewall rules with the latest IP prefixes from the Azure IP Ranges and Service Tags JSON and refresh them periodically.

Storage

Azure NetApp Files Flexible Service Level

Azure NetApp Files introduces the Flexible service level, allowing independent configuration of storage capacity and throughput to optimize cost and performance without volume moves. Supported on manual QoS capacity pools, throughput can be tuned between 128 MiB/s and 640 MiB/s per provisioned TiB, with a baseline 128 MiB/s provided for every pool at no additional cost. This enables right-sizing for both capacity-heavy workloads with modest performance needs and demanding workloads—such as Oracle or SAP HANA—that require higher throughput on smaller capacity footprints. The Flexible service level is available for newly created pools only, is supported in all Azure NetApp Files regions, and works with cool access for additional savings.

Cross-tenant customer-managed keys for Azure NetApp Files volume encryption

Azure NetApp Files now supports cross-tenant Customer-Managed Keys (CMK) for volume encryption, enabling customers to manage their own encryption keys across different Azure tenancies. This capability gives SaaS providers and their end users greater control in multi-tenant scenarios by allowing end users to retain full key ownership while providers offer flexible key-management options. The feature is available in all Azure NetApp Files–supported regions, delivering secure, scalable, and compliant data protection across tenant boundaries.

Azure NetApp Files support for OpenLDAP, FreeIPA, and Red Hat Directory Server (preview)

Azure NetApp Files introduces public preview support for integrating with FreeIPA, OpenLDAP, and Red Hat Directory Server, enabling secure LDAP over TLS for NFSv3 and NFSv4.1 volumes alongside Microsoft Active Directory. This enhancement streamlines identity integration for hybrid environments and regulated industries, improving access control for NFS workloads. Key benefits include broader LDAP support, secure LDAP over TLS, seamless use with existing identity infrastructure, and greater flexibility for compliance-driven deployments. The preview is available in all Azure NetApp Files regions, with use cases spanning financial services, government, and enterprises standardizing identity across cloud and on-premises estates.

Azure Local

Arc Gateway for Azure Local

Arc Gateway for Azure Local is now generally available, delivering a single, centralized HTTPS egress point for all Azure-bound traffic from Azure Local instances and workloads. By consolidating outbound connectivity behind one “front door,” it reduces the need for sprawling firewall rules and eliminates wildcards, significantly simplifying configuration and strengthening security posture. The gateway cuts required endpoints from well over 100 to fewer than 28 and integrates seamlessly with enterprise proxies by routing outbound traffic through existing proxy infrastructure before reaching Azure. It provides comprehensive coverage for workloads: Azure Local VMs can use Arc Gateway whether or not the infrastructure enabled it during deployment—so long as an Arc Gateway resource exists and guest management is enabled; new VMs can also be deployed with the gateway. AKS clusters on Azure Local implicitly leverage the host-level Arc Gateway when it was enabled for the infrastructure at deployment; AKS with Arc Gateway remains in Public Preview until its future GA. Support for enabling Arc Gateway on existing Azure Local infrastructure is planned for a future release.

Conclusion

Over the past two weeks, Microsoft has introduced a slew of updates and announcements pertaining to Azure Infrastructure as a Service (IaaS) and Azure Local. These developments underscore the tech giant’s unwavering commitment to enhancing its cloud offerings and adapting to the ever-evolving needs of businesses and developers. Users of Azure can anticipate improved functionalities, streamlined services, and enriched features as a result of these changes. Stay tuned for more insights as I continue to monitor and report on Azure’s progression in the cloud sphere.

Azure Hybrid Management & Security: What’s New and Insights from the Field – September 2025

Once again this month, I’m back with my recurring series focused on the evolution of Azure management and security services, with a special focus on hybrid and multicloud scenarios enabled by Azure Arc and enhanced by the use of Artificial Intelligence.

This monthly series aims to:

  • Provide an overview of the most relevant updates released by Microsoft;

  • Share operational tips and field-proven best practices to help architects and IT leaders manage complex and distributed environments more effectively;

  • Follow the evolution towards a centralized, proactive, and AI-driven management model, in line with Microsoft’s vision of AI-powered Management.

The main areas addressed in this series, together with the corresponding tools and services, are described in this article.

Hybrid and multicloud environment management

Azure Arc

Starting September 30, 2025, Azure App Service on Azure Arc-enabled Kubernetes will be retired and it will no longer be possible to install the extension. To continue hosting application workloads, Microsoft recommends migrating to alternative solutions such as Azure Container Apps on Azure Arc-enabled Kubernetes, which also enables you to leverage Logic Apps Hybrid. A timely assessment and migration plan is recommended to ensure completion by the deadlines, minimizing risks and service disruptions in hybrid and multicloud environments.

Security posture across hybrid and multicloud infrastructures

Microsoft Defender for Cloud

New features, bug fixes, and deprecated features of Microsoft Defender for Cloud

The development of Microsoft Defender for Cloud is constantly evolving, with continuous improvements being introduced. To stay updated on the latest developments, Microsoft updates this page, which provides information on new features, bug fixes, and deprecated features. Specifically, this month’s main news includes:

  • Malware automated remediation in Defender for Storage (preview): the automated remediation feature for Defender for Storage malware scanning is now available in public preview. When on-upload or on-demand scans detect malicious blobs, the contents can be soft-deleted automatically. This ensures immediate isolation while maintaining recoverability for forensic analysis purposes. The setting can be toggled at the subscription or storage account level from the Microsoft Defender for Cloud blade in the Azure portal, or via API.
  • Refined attack paths: attack paths have been improved to reflect realistic risks that an adversary could use to compromise the organization. The new experience emphasizes external entry points and the attacker’s progression toward business-critical assets, providing greater clarity, focus, and prioritization. This enables security teams to respond more quickly and confidently to the most critical exposures.
  • Trusted IPs for Internet exposure analysis: Defender for Cloud allows you to define trusted IP ranges to reduce false positives in Internet exposure analysis. Resources that are only accessible from trusted IPs are classified as trusted and, as a result, Defender for Cloud does not generate attack paths for those sources.
  • Exposure width for Internet exposure analysis (GA): the Exposure width metric is now Generally Available in Microsoft Defender for Cloud. This capability shows how a resource is exposed to the Internet based on network rules, helping security teams quickly identify and remediate the most critical attack paths.
  • Trivy dependency scanning for code repositories (update): Defender for Cloud now includes open-source dependency scanning based on Trivy in filesystem mode, to automatically detect operating system and library vulnerabilities in GitHub and Azure DevOps repositories.

Backup & Resilience

Azure Backup

Vaulted backup for Azure Files (Premium)

With Azure Backup, “in-vault” protection is now available for Premium shares as well, ensuring business continuity and compliance even in the event of accidental deletions, malicious activity, or ransomware. Vaulted backup keeps a secure, off-site copy of the data, independent of the source account.

Key capabilities of vaulted backup:

  • Off-site protection: stores an independent copy of data in the vault, enabling restore even if the source account is lost or compromised. You can restore to the original account or to an alternate account.
  • Resilience to deletions and attacks: isolated backups that protect against accidental deletions, insider threats, and ransomware, ensuring operational continuity.
  • Automatic and flexible backups: support for daily/weekly schedules, or on-demand backups when needed.
  • Long-term retention: ability to retain backup data for up to 99 years, meeting compliance and archiving requirements.
  • Security by design: safeguards such as soft delete, immutability, encryption, and multi-user authorization protect data in the vault from tampering or misuse.

Azure Site Recovery

Support for virtual machines with Premium SSD v2 disks

General availability has been announced for Azure Site Recovery (ASR) support for virtual machines that use Premium SSD v2 disks. ASR enables replication across Azure regions and from on-premises to Azure, automated failover, and non-disruptive disaster recovery testing, helping ensure business continuity with built-in security, compliance, and native integration with Azure services. Premium SSD v2 delivers low latency and consistent performance, with the flexibility to scale throughput and IOPS independently—an ideal combination for enterprise workloads such as SQL Server, Oracle, SAP, and big data.

Monitoring

Azure Monitor

Azure Resource Manager: new metrics in Azure Monitor

Azure Resource Manager (ARM) introduces enhanced integration with Azure Monitor Metrics at the subscription level, enabling deeper visibility into traffic, latency, and throttling of control-plane operations. Metrics are accessible via REST API, SDKs, or directly from the Azure portal, with no opt-in required. New dimensions are also available for advanced analysis and filtering: operation type (read/write/delete), ARM request region, HTTP method, HTTP status code, status code class (2xx, 4xx, 5xx), resource type, and resource provider namespace.
These enhancements strengthen troubleshooting, capacity planning, and governance, simplifying granular monitoring of complex, distributed environments.

High Scale mode for Azure Monitor – Container Insights

Microsoft announces general availability of the High Scale mode in Container Insights, the Azure Monitor solution for collecting logs from Azure Kubernetes Service (AKS) clusters. Enabling High Scale applies a set of configuration optimizations automatically that significantly increase collection throughput, without requiring customer intervention or additional parameters. This mode supports higher telemetry loads in AKS clusters, improving observability and time-to-analysis in large-scale environments, including hybrid and multicloud scenarios integrated with Azure Arc.

Azure Managed Service for Prometheus: native Grafana dashboards in the Azure portal (preview)

Public Preview is available for the native, no-additional-cost integration of Grafana dashboards within the Azure portal for Azure Managed Service for Prometheus. With this update, you can quickly use and customize Grafana dashboards directly in the portal, avoiding the need to deploy and maintain dedicated Grafana instances or additional Azure resources. The integration streamlines observability and reduces administrative overhead, accelerating the creation of visualizations useful for monitoring and troubleshooting containerized and distributed workloads.

Conclusions

This month’s updates—from the retirement of App Service on Arc-enabled Kubernetes and the need to plan that migration in advance, to the Defender for Cloud improvements (automated remediation, more realistic attack paths, trusted IPs, and Exposure width in GA), and on to the resilience advancements with Azure Backup for Files Premium and ASR for Premium SSD v2—all converge on the same goal: reducing attack surface, increasing workload reliability, and simplifying operations at scale. On the monitoring front, the enriched ARM metrics, Container Insights’ High Scale mode, and the “native” Grafana dashboards in Managed Prometheus raise the bar for transparency and time-to-insight without adding complexity. My call to action is to turn these guidelines into concrete steps: assess and begin migrating off retiring assets, recalibrate security policies by leveraging the new prioritization and remediation capabilities, extend “in-vault” backup policies where needed, and standardize monitoring practices by adopting the latest metrics and dashboards.

Azure IaaS and Azure Local: announcements and updates (September 2025 – Weeks: 37 and 38)

This blog post series highlights the key announcements and major updates related to Azure Infrastructure as a Service (IaaS) and Azure Local, as officially released by Microsoft in the past two weeks.

Azure

General

Licensing changes for future Azure VMware Solution subscriptions starting October 16, 2025

Microsoft has announced licensing changes for Azure VMware Solution (AVS) following Broadcom’s updates to VMware licensing policies. Beginning October 16, 2025, customers purchasing new or additional AVS nodes must bring their own portable VMware Cloud Foundation (VCF) subscription from Broadcom or an authorized reseller. Existing AVS deployments with VCF included under Reserved Instance (RI) terms can continue operating without licensing or product changes through the end of the RI term, and customers may use the self-service exchange process to trade in an RI on or before October 15, 2025 for a later expiration date. For Pay-As-You-Go subscriptions that included VCF, customers are advised to contact their Microsoft account team for details and key dates. The AVS service itself is unchanged and remains a fully managed VCF private cloud in Azure. 

At-cost data transfer between Azure and an external endpoint

Azure now provides at-cost data transfer for customers and Cloud Solution Provider partners in Europe who move data over the public internet between Azure and another data processing provider, supporting interoperable, multi-cloud architectures. Eligible organizations—those with billing addresses in the European Economic Area (EEA), European Free Trade Association (EFTA), or the United Kingdom—may request a credit for such cross-cloud transfers by following the documented Azure Support process and meeting the stated eligibility requirements.

Azure mandatory multifactor authentication: Phase 2 starting in October 2025

Microsoft confirmed the next phase of its mandatory multifactor authentication (MFA) rollout for Azure sign-ins, citing research that MFA can block more than 99.2% of account compromise attempts. Following the August 2024 announcement and the completion of Phase 1 in March 2025 (enforcement for Azure Portal, Microsoft Entra admin center, and Intune admin center sign-ins across 100% of tenants), Phase 2 will begin on October 1, 2025. This phase enforces MFA at the Azure Resource Manager layer for resource management operations across clients including Azure CLI, Azure PowerShell, the Azure Mobile App, REST APIs, SDK libraries, and Infrastructure-as-Code tools, with gradual application via Azure Policy under safe deployment practices. Notifications have been sent to Microsoft Entra Global Administrators through email and Azure Service Health. The change requires users to authenticate with MFA before executing resource management actions; workload identities such as managed identities and service principals are not impacted. To prepare, organizations are advised to enable MFA for users by October 1, 2025, assess potential impact using built-in Azure Policy definitions in audit or enforcement mode, and update clients to Azure CLI version 2.76 and Azure PowerShell version 14.3 or later. If MFA cannot be enabled by the start date, a Global Administrator can postpone enforcement in the Azure portal, with further communications to follow via established channels.

Compute

Retirement: Azure Kubernetes Service on VMware (preview) will be retired on March 16, 2026 (preview)

Azure Kubernetes Service on VMware (preview) will be retired on March 16, 2026. Customers are encouraged to transition to Azure Kubernetes Service on Azure Local before that date to take advantage of its enhanced capabilities. After March 16, 2026, deployments of AKS on VMware will no longer be possible and support will cease. For additional questions, Microsoft directs customers to AKS on Azure Local. 

Azure D192 sizes in the Azure Dsv6 and Ddsv6-series VM families

Microsoft has added the D192 size to the Dsv6 and Ddsv6-series VMs, powered by 5th Gen Intel® Xeon® Platinum 8573C (Emerald Rapids). Dsv6 uses Azure managed disks only, while Ddsv6 offers local temporary storage. These sizes deliver 192 vCPUs and 768 GiB RAM, targeting general-purpose, memory-intensive, and enterprise workloads such as SAP, SQL, in-memory analytics, large relational databases, web/app servers under moderate-to-heavy traffic, batch processing, and dev/test. Azure Boost provides up to 400K IOPS and 12 GB/s remote storage throughput with NVMe-enabled local and remote storage, and up to 82 Gbps network bandwidth. Security is strengthened with Intel® Total Memory Encryption (TME), and the NVMe interface yields up to a 3× improvement in local storage IOPS for low-latency access.

DCa/ECa v6-series AMD-based confidential VMs now generally available

Microsoft is making the new DCa/ECa v6-series AMD-based confidential virtual machines generally available in UAE North, Korea Central, West Central US, South Africa North, Switzerland North, and UK South. Powered by 4th Gen AMD EPYC™ processors with Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP), these VMs provide hardware-based memory encryption so that memory written by a VM can only be accessed by that VM, with encryption keys generated by a dedicated secure processor on the CPU and not retrievable from software. The lineup includes the general-purpose DCasv6-series and the memory-optimized ECasv6-series, offering improved performance and price-performance over prior AMD-based confidential VMs. Workloads can typically migrate without code changes, making these VMs well-suited for processing sensitive data such as PII and PHI within an attested trusted execution environment.

Azure HBv5-series VMs (preview)

Azure has introduced HBv5-series VMs in public preview in the South Central US region. Designed for memory bandwidth–intensive HPC workloads—including CFD, automotive and aerospace simulation, weather modeling, energy research, molecular dynamics, and computer-aided engineering—HBv5 features 6.7 TB/s of memory bandwidth across 450 GB (438 GiB) of HBM. Each VM provides 368 4th Gen AMD EPYC™ cores at 3.5 GHz base and up to 4.0 GHz boost with no simultaneous multithreading, 800 Gb/s NVIDIA Networking InfiniBand for supercomputer-scale MPI, and 15 TiB of local NVMe SSD delivering up to 50 GB/s reads and 30 GB/s writes.

Networking

Introducing the new Network Security Hub experience

Microsoft has expanded and rebranded the Azure Firewall Manager experience as the Network Security Hub, a centralized interface that unifies Azure Firewall, Web Application Firewall (WAF), and DDoS Protection. The refreshed experience simplifies the Azure Networking portfolio with improved navigation, consolidated service overviews, and enhanced visibility into security coverage. A redesigned landing page surfaces common use cases, documentation, pricing, and recommended scenarios to accelerate onboarding. Key highlights include a single hub to manage Firewall, WAF, and DDoS Protection, an enhanced coverage dashboard across virtual networks, hubs, and applications, Azure Advisor–driven recommendations for security and performance, and streamlined discovery of resources such as Virtual Hub deployments and Firewall Policies.

Enabling dedicated connections to backends in Azure Application Gateway

Azure Application Gateway v2 now supports dedicated connections from the gateway to backend servers. While the default behavior reuses idle backend TCP connections to optimize resource usage, the new setting maps each incoming client connection to its own distinct backend connection, enabling strict one-to-one communication between frontend and backend when required.

Backend TLS validation controls in Azure Application Gateway

Azure Application Gateway v2 announces the general availability of customer-controlled backend TLS validations. When HTTPS is selected in Backend Settings, operators can now enable or disable certificate chain and expiry verification and separately enable or disable SNI verification. These options allow teams to tailor TLS behavior to the needs of diverse environments while preserving secure, reliable connectivity to backend services.

Storage

Azure NetApp Files migration assistant

Azure NetApp Files migration assistant (using SnapMirror) is now generally available, enabling efficient, cost-effective data migration from on-premises environments or CVO/other cloud providers to Azure NetApp Files. Available via REST API, the capability leverages ONTAP replication to reduce network transfer for baseline and incremental updates, supports low-downtime cutovers to minimize business disruption, and preserves primary data protection with source volume snapshots while maintaining directory and file metadata, including security attributes.

Retirement: OS disks on Standard HDD will be retired on September 8, 2028

Microsoft announced that service for operating system (OS) disks running on Standard HDD will be retired on September 8, 2028, in alignment with evolving usage patterns and investments in disk performance and reliability. After that date, any remaining OS disks on Standard HDD will be converted to Standard SSD of equivalent size if not migrated beforehand, with further details to follow in public documentation. This change does not affect Standard HDD data disks (non-boot volumes) or Ephemeral OS disks. To mitigate risk, customers are expected to avoid deploying new VMs with HDD OS disks and to migrate existing HDD OS disks to Standard SSD or Premium SSD ahead of the retirement date.

Azure Data Box Next Gen expands general availability to additional regions

Microsoft has expanded general availability for Azure Data Box Next Gen to India, Qatar, South Africa, and Korea. With this update, both the 120 TB and 525 TB NVMe-based Data Box devices are generally available in the US, UK, Europe, US Gov, Canada, Japan, Australia, Singapore, India, and Qatar. The 120 TB model is also generally available in Brazil, UAE, Hong Kong, Switzerland, Norway, South Africa, and Korea. Announced earlier this year, the next-generation devices have already ingested several petabytes across multiple industries, with customers reporting up to 10× faster transfers. Organizations value the devices’ reliability and efficiency for large-scale migration projects, and can select the appropriate SKU and place orders directly from the Azure portal. 

File share-centric management model for Azure Files (preview)

Azure Files now introduces a file share–centric management model via the Microsoft.FileShares resource provider, making file shares top-level Azure resources that no longer require a storage account. With this shift, file shares can be provisioned independently for capacity, IOPS, and throughput—removing contention with other shares and enabling granular networking and security controls. The model adopts the SSD provisioned v2 cost structure for predictable, flexible billing and brings ~2× faster provisioning, higher scale limits, and share-level billing for clearer cost attribution. This preview streamlines creation and lifecycle management while aligning performance and cost directly to each share.

Azure Local

Direct upgrade from Azure Stack HCI OS 22H2 to 24H2 via PowerShell

With the 2505 release, Azure Stack HCI administrators can now perform a direct in-place upgrade from version 20349.xxxx (22H2) to version 26100.xxxx (24H2) using PowerShell. This streamlined path removes an intermediate hop, reducing the number of reboots and simplifying maintenance planning ahead of the broader solution upgrade.

Conclusion

Over the past two weeks, Microsoft has introduced a slew of updates and announcements pertaining to Azure Infrastructure as a Service (IaaS) and Azure Local. These developments underscore the tech giant’s unwavering commitment to enhancing its cloud offerings and adapting to the ever-evolving needs of businesses and developers. Users of Azure can anticipate improved functionalities, streamlined services, and enriched features as a result of these changes. Stay tuned for more insights as I continue to monitor and report on Azure’s progression in the cloud sphere.