<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/</link>
    <description>Microsoft Community Hub</description>
    <pubDate>Sun, 05 Apr 2026 07:15:12 GMT</pubDate>
    <dc:creator>Community</dc:creator>
    <dc:date>2026-04-05T07:15:12Z</dc:date>
    <item>
      <title>I don't want to pay extra for copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-365/i-don-t-want-to-pay-extra-for-copilot/m-p/4508737#M59151</link>
      <description>&lt;P&gt;How do I make sure I don't pay extra for something I rarely use? My subscription is £85pa (well, £84.99).&lt;/P&gt;&lt;P&gt;P..s. What's going on with this? Also got this social media sharing bar blocking part of this page.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 23:06:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-365/i-don-t-want-to-pay-extra-for-copilot/m-p/4508737#M59151</guid>
      <dc:creator>David_pc</dc:creator>
      <dc:date>2026-04-04T23:06:56Z</dc:date>
    </item>
    <item>
      <title>When the audio pipeline decides to act up 😂🤌</title>
      <link>https://techcommunity.microsoft.com/t5/windows-insider-program/when-the-audio-pipeline-decides-to-act-up/m-p/4508675#M42550</link>
      <description>&lt;img /&gt;&lt;P&gt;Ever since build 2820.x.x.x, I’ve been keeping an eye on one specific process — Audio Graph Isolation.&lt;/P&gt;&lt;P&gt;And this little troublemaker 😂 sometimes decides it wants to “spice up your day.”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not by taking a few MB of RAM…&lt;/P&gt;&lt;P&gt;Oh no, no — it goes straight for several gigabytes 😂&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you’re just sitting there, wondering why your system suddenly starts lagging, why the audio sounds like a corrupted Star Trek transmission after a virus attack 🙈😂&lt;/P&gt;&lt;P&gt;You open Task Manager, sort by RAM usage…&lt;/P&gt;&lt;P&gt;And there it is, grinning at you, Audio Graph Isolation, quietly turning your system into its personal victim 🙈&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to deal with it until Microsoft finally fixes this regression?&lt;/P&gt;&lt;P&gt;Honestly — the only thing that works is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;👉 force‑killing Audio Graph Isolation in Task Manager&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And boom, your system instantly gets its speed back.&lt;/P&gt;&lt;P&gt;Unfortunately, because of this regression, you have to keep an eye on this process regularly, since the RAM leak can happen anytime during idle —&lt;/P&gt;&lt;P&gt;whether you’re watching a movie, listening to music, or the system is just running with no user input.&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 16:53:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-insider-program/when-the-audio-pipeline-decides-to-act-up/m-p/4508675#M42550</guid>
      <dc:creator>kikero_exe</dc:creator>
      <dc:date>2026-04-04T16:53:26Z</dc:date>
    </item>
    <item>
      <title>Vector Drift in Azure AI Search: Three Hidden Reasons Your RAG Accuracy Degrades After Deployment</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/vector-drift-in-azure-ai-search-three-hidden-reasons-your-rag/ba-p/4493031</link>
      <description>&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;What Is Vector Drift?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Vector drift occurs when embeddings stored in a vector index no longer accurately represent the semantic intent of incoming queries.&lt;/P&gt;
&lt;P&gt;Because vector similarity search depends on relative semantic positioning, even small changes in models, data distribution, or preprocessing logic can significantly affect retrieval quality over time.&lt;/P&gt;
&lt;P&gt;Unlike schema drift or data corruption, vector drift is subtle:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The system continues to function&lt;/LI&gt;
&lt;LI&gt;Queries return results&lt;/LI&gt;
&lt;LI&gt;But relevance steadily declines&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Cause 1: Embedding Model Version Mismatch&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;U&gt;What Happens&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Documents are indexed using one embedding model, while query embeddings are generated using another. This typically happens due to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Model upgrades&lt;/LI&gt;
&lt;LI&gt;Shared Azure OpenAI resources across teams&lt;/LI&gt;
&lt;LI&gt;Inconsistent configuration between environments&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;Why This Matters&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Embeddings generated by different models:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Exist in different vector spaces&lt;/LI&gt;
&lt;LI&gt;Are not mathematically comparable&lt;/LI&gt;
&lt;LI&gt;Produce misleading similarity scores&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As a result, documents that were previously relevant may no longer rank correctly.&lt;/P&gt;
&lt;P&gt;Recommended Practice&lt;/P&gt;
&lt;P&gt;A single vector index should be bound to one embedding model and one dimension size for its entire lifecycle.&lt;/P&gt;
&lt;P&gt;If the embedding model changes, the index must be fully re-embedded and rebuilt.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Cause 2: Incremental Content Updates Without Re-Embedding&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;U&gt;What Happens&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;New documents are continuously added to the index, while existing embeddings remain unchanged. Over time, new content introduces:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Updated terminology&lt;/LI&gt;
&lt;LI&gt;Policy changes&lt;/LI&gt;
&lt;LI&gt;New product or domain concepts&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Because semantic meaning is relative, the vector space shifts—but older vectors do not.&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Observable Impact&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Recently indexed documents dominate retrieval results&lt;/LI&gt;
&lt;LI&gt;Older but still valid content becomes harder to retrieve&lt;/LI&gt;
&lt;LI&gt;Recall degrades without obvious system errors&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;U&gt;Practical Guidance&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Treat embeddings as living assets, not static artifacts:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Schedule periodic re-embedding for stable corpora&lt;/LI&gt;
&lt;LI&gt;Re-embed high-impact or frequently accessed documents&lt;/LI&gt;
&lt;LI&gt;Trigger re-embedding when domain vocabulary changes meaningfully&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Declining similarity scores or reduced citation coverage are often early signals of drift.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Cause 3: Inconsistent Chunking Strategies&lt;/STRONG&gt;&lt;/H5&gt;
&lt;img /&gt;
&lt;P&gt;&lt;U&gt;What Happens&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Chunk size, overlap, or parsing logic is adjusted over time, but previously indexed content is not updated. The index ends up containing chunks created using different strategies.&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Why This Causes Drift&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Different chunking strategies produce:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Different semantic density&lt;/LI&gt;
&lt;LI&gt;Different contextual boundaries&lt;/LI&gt;
&lt;LI&gt;Different retrieval behavior&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This inconsistency reduces ranking stability and makes retrieval outcomes unpredictable.&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Governance Recommendation&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Chunking strategy should be treated as part of the index contract:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use one chunking strategy per index&lt;/LI&gt;
&lt;LI&gt;Store chunk metadata (for example, chunk_version)&lt;/LI&gt;
&lt;LI&gt;Rebuild the index when chunking logic changes&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Design Principles&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Versioned embedding deployments&lt;/LI&gt;
&lt;LI&gt;Scheduled or event-driven re-embedding pipelines&lt;/LI&gt;
&lt;LI&gt;Standardized chunking strategy&lt;/LI&gt;
&lt;LI&gt;Retrieval quality observability&lt;/LI&gt;
&lt;LI&gt;Prompt and response evaluation&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Key Takeaways&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Vector drift is an architectural concern, not a service defect&lt;/LI&gt;
&lt;LI&gt;It emerges from model changes, evolving data, and preprocessing inconsistencies&lt;/LI&gt;
&lt;LI&gt;Long-lived RAG systems require embedding lifecycle management&lt;/LI&gt;
&lt;LI&gt;Azure AI Search provides the controls needed to mitigate drift effectively&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Vector drift is an expected characteristic of production RAG systems. Teams that proactively manage embedding models, chunking strategies, and retrieval observability can maintain reliable relevance as their data and usage evolve. Recognizing and addressing vector drift is essential to building and operating robust AI solutions on Azure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Further Reading&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The following Microsoft resources provide additional guidance on vector search, embeddings, and production-grade RAG architectures on Azure.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure AI Search – Vector Search Overview - &lt;A href="https://learn.microsoft.com/azure/search/vector-search-overview" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/azure/search/vector-search-overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure OpenAI – Embeddings Concepts - &lt;A href="https://learn.microsoft.com/en-us/azure/ai-foundry/openai/how-to/embeddings?view=foundry-classic&amp;amp;tabs=csharp" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/ai-foundry/openai/how-to/embeddings?view=foundry-classic&amp;amp;tabs=csharp&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Retrieval-Augmented Generation (RAG) Pattern on Azure - &lt;A href="https://learn.microsoft.com/en-us/azure/search/retrieval-augmented-generation-overview?tabs=videos" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/search/retrieval-augmented-generation-overview?tabs=videos&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure Monitor – Observability Overview - &lt;A href="https://learn.microsoft.com/azure/azure-monitor/overview" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/azure/azure-monitor/overview&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sat, 04 Apr 2026 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/vector-drift-in-azure-ai-search-three-hidden-reasons-your-rag/ba-p/4493031</guid>
      <dc:creator>akankshaGahalout</dc:creator>
      <dc:date>2026-04-04T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Entra CBA Preview Bug: Issuer Scoping Policy fails group claim (AADSTS500191)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-cba-preview-bug-issuer-scoping-policy-fails-group-claim/m-p/4508663#M10300</link>
      <description>&lt;P&gt;I am deploying a zero-trust, cloud-native Certificate-Based Authentication (CBA) architecture for a break-glass emergency access account in Microsoft Entra ID. I am intentionally bypassing Intune/MDM to prevent circular dependencies during an outage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PKI is generated via OpenSSL (Offline Root CA -&amp;gt; Client Cert). The cryptography is flawless:&lt;/P&gt;&lt;P&gt;- The OpenSSL chain verifies perfectly (openssl verify -CAfile...).&lt;/P&gt;&lt;P&gt;- The Root SKI and Client AKI are a perfect 1:1 hex match.&lt;/P&gt;&lt;P&gt;- The client cert EKU includes TLS Web Client Authentication.&lt;/P&gt;&lt;P&gt;- The client cert SAN includes othername: UPN::[break-glass-UPN].&lt;/P&gt;&lt;P&gt;- The Root CA and CRL are uploaded to Entra and publicly accessible via Azure Blob Storage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Issue:&lt;/P&gt;&lt;P&gt;When I attempt to restrict the Root CA using the "Certificate issuer scoping policy (Preview)" targeted to a specific Security Group (e.g., sg_cba), the TLS handshake drops and Entra throws:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error: AADSTS500191: The certificate authority that issued your certificate has not been set up in the tenant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Troubleshooting Performed:&lt;/P&gt;&lt;P&gt;1. Group Architecture: Verified via Microsoft Graph that the user is a direct, static member of sg_cba (Security Enabled, non-dynamic, not nested).&lt;/P&gt;&lt;P&gt;2. Micro-Group Bypass: Created a brand-new cloud-only micro-group with only the break-glass user. Waited for replication. Same 500191 error.&lt;/P&gt;&lt;P&gt;3. The Control Test (Success): If I completely remove the Preview scoping policy and move the targeting to the Generally Available (GA) tenant-wide trust ("All Users"), the login succeeds immediately. (I am securing this via High-Affinity binding matching the SKI to CertificateUserIDs).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Ask:&lt;/P&gt;&lt;P&gt;Because the tenant-wide GA policy works perfectly, it mathematically proves the certificates, CRL, and bindings are correct. The failure is entirely isolated to the Preview scoping engine failing to correlate the incoming certificate to the Security Group claim fast enough.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Has anyone successfully deployed the "Certificate issuer scoping policy (Preview)" using a targeted security group without it dropping the trust?&lt;/P&gt;&lt;P&gt;- Are there undocumented constraints on group evaluation during the CBA TLS handshake that cause this Preview feature to fail closed?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 14:46:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-cba-preview-bug-issuer-scoping-policy-fails-group-claim/m-p/4508663#M10300</guid>
      <dc:creator>alejlw</dc:creator>
      <dc:date>2026-04-04T14:46:33Z</dc:date>
    </item>
    <item>
      <title>How to Secure Your Windows 11 PC (Complete Guide)</title>
      <link>https://techcommunity.microsoft.com/t5/windows-11/how-to-secure-your-windows-11-pc-complete-guide/m-p/4508629#M38565</link>
      <description>&lt;P data-slot-rendered-content="true"&gt;If you’re using Windows 11 daily—whether for work, gaming, or personal tasks security should never be an afterthought. As someone who has worked extensively with Windows systems, I can confidently say that Windows 11 is one of the most secure operating systems Microsoft has released. But here’s the catch: out-of-the-box security is only the starting point. To truly protect your PC, you need to actively configure and maintain it.&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://dellenny.com/how-to-secure-your-windows-11-pc-complete-guide/" target="_blank"&gt;https://dellenny.com/how-to-secure-your-windows-11-pc-complete-guide/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 09:26:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-11/how-to-secure-your-windows-11-pc-complete-guide/m-p/4508629#M38565</guid>
      <dc:creator>JohnNaguib</dc:creator>
      <dc:date>2026-04-04T09:26:58Z</dc:date>
    </item>
    <item>
      <title>Windows 11 What is this logo used for？</title>
      <link>https://techcommunity.microsoft.com/t5/windows-11/windows-11-what-is-this-logo-used-for/m-p/4508606#M38560</link>
      <description>&lt;P&gt;I saw an unknown logo on Windows 11 and would like to know what it is for.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 05:49:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-11/windows-11-what-is-this-logo-used-for/m-p/4508606#M38560</guid>
      <dc:creator>KevinHarvey</dc:creator>
      <dc:date>2026-04-04T05:49:26Z</dc:date>
    </item>
    <item>
      <title>Windows 11 Keeps Prompting GPU Driver Installation on Every Restart</title>
      <link>https://techcommunity.microsoft.com/t5/windows-11/windows-11-keeps-prompting-gpu-driver-installation-on-every/m-p/4508590#M38559</link>
      <description>&lt;P&gt;My GPU driver is already installed, but Windows 11 still shows the installation prompt after every restart. Deleting the installer didn’t help. How to fix this?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 04:46:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-11/windows-11-keeps-prompting-gpu-driver-installation-on-every/m-p/4508590#M38559</guid>
      <dc:creator>BrantleyTaylor</dc:creator>
      <dc:date>2026-04-04T04:46:41Z</dc:date>
    </item>
    <item>
      <title>Windows 11 Screen automatically turns warm without night mode</title>
      <link>https://techcommunity.microsoft.com/t5/windows-11/windows-11-screen-automatically-turns-warm-without-night-mode/m-p/4508589#M38558</link>
      <description>&lt;P&gt;My Windows 11 screen keeps turning warm automatically even with night mode off. It briefly normalizes when I click the screen then warms up again. How to fix this?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 04:45:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-11/windows-11-screen-automatically-turns-warm-without-night-mode/m-p/4508589#M38558</guid>
      <dc:creator>DevonZhang</dc:creator>
      <dc:date>2026-04-04T04:45:09Z</dc:date>
    </item>
    <item>
      <title>How XLOOKUP arguments apply in this case</title>
      <link>https://techcommunity.microsoft.com/t5/excel/how-xlookup-arguments-apply-in-this-case/m-p/4508574#M258288</link>
      <description>&lt;P&gt;I'm not an Excel newbie, but I have never had cause to use XLOOKUP, INDEX, or MATCH before.&amp;nbsp; I'm not understanding how the xlookup arguments would apply in my case or if index/match would be better.&amp;nbsp; I have an array with months as my row headings and dates as my column headings.&amp;nbsp; The array itself is filled with number of pages read each day.&amp;nbsp; I'm trying to have a cell indicating on which date I did the maximum amount of reading.&amp;nbsp; So I want to start with the max value of my array and return the month (row) and date (column) heading using xlookup.&amp;nbsp; Whether those are in one cell or two, doesn't so much matter - it's a hobby tracker, but no matter how I try and call this, I end up with a value error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;So for example, I would want this to return January 3rd.&amp;nbsp; Every example I'm finding seems to show how to input Jan 3rd and return the value 758.&amp;nbsp; What am I missing to look this up the other way around?&amp;nbsp; Should I be using index or match instead?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 00:43:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/excel/how-xlookup-arguments-apply-in-this-case/m-p/4508574#M258288</guid>
      <dc:creator>MollyKitti</dc:creator>
      <dc:date>2026-04-04T00:43:33Z</dc:date>
    </item>
    <item>
      <title>Not understanding XLOOKUP arguments as they apply here</title>
      <link>https://techcommunity.microsoft.com/t5/excel/not-understanding-xlookup-arguments-as-they-apply-here/m-p/4508573#M258287</link>
      <description>undefined</description>
      <pubDate>Sat, 04 Apr 2026 00:31:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/excel/not-understanding-xlookup-arguments-as-they-apply-here/m-p/4508573#M258287</guid>
      <dc:creator>MollyKitti</dc:creator>
      <dc:date>2026-04-04T00:31:08Z</dc:date>
    </item>
    <item>
      <title>April 2026 MSLE Newsletter available now!</title>
      <link>https://techcommunity.microsoft.com/t5/connect-and-ask-questions/april-2026-msle-newsletter-available-now/m-p/4508567#M307</link>
      <description>&lt;P&gt;&lt;SPAN data-teams="true"&gt;Head over to the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/category/microsoft-learn-for-educators/blog/microsoft-learn-for-educators-blog" data-lia-auto-title="blog section" data-lia-auto-title-active="0" target="_blank"&gt;blog section&lt;/A&gt; and read the newest edition of the MSLE Newsletter, also available in Arabic, Chinese (Traditional), French, Portuguese, and Spanish&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;From the&amp;nbsp;&lt;STRONG&gt;Microsoft Learn for Educators&lt;/STRONG&gt;&amp;nbsp;community page, select&amp;nbsp;&lt;STRONG&gt;Blogs&lt;/STRONG&gt;&amp;nbsp;from the top navigation menu.&lt;/LI&gt;
&lt;LI&gt;There, you’ll find the&amp;nbsp;&lt;STRONG&gt;Microsoft Learn for Educators News&lt;/STRONG&gt; blog where you can find the newsletter. Additional language versions can be found as attachments to the blog.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 03 Apr 2026 23:27:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/connect-and-ask-questions/april-2026-msle-newsletter-available-now/m-p/4508567#M307</guid>
      <dc:creator>RobinLBaldwin</dc:creator>
      <dc:date>2026-04-03T23:27:05Z</dc:date>
    </item>
    <item>
      <title>Expanding Azure Arc SQL Migration with a New Target: SQL Server on Azure Virtual Machines</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-data-migration-blog/expanding-azure-arc-sql-migration-with-a-new-target-sql-server/ba-p/4508564</link>
      <description>&lt;P&gt;Modernizing a SQL Server estate is rarely a single-step effort. It typically involves multiple phases, from discovery and assessment to migration and optimization, often spanning on-premises, hybrid, and cloud environments. SQL Server enabled by Azure Arc simplifies this process by bringing all migration steps into a single, cohesive experience in the Azure portal.&lt;/P&gt;
&lt;P&gt;With the March 2026 release, this integrated experience is extended by adding &lt;STRONG&gt;SQL Server on Azure Virtual Machines &lt;/STRONG&gt;as a new migration target in Azure Arc. Arc-enabled SQL Server instances can now be migrated not only to Azure SQL Managed Instance, but also to SQL Server running on Azure infrastructure, using the same unified workflow.&lt;/P&gt;
&lt;H3&gt;Expanding Choice Without Adding Complexity&lt;/H3&gt;
&lt;P&gt;By introducing SQL Server on Azure Virtual Machines as a migration target, Azure Arc now supports a broader range of migration strategies while preserving a single operational model. It becomes possible to choose between Azure SQL Managed Instance and SQL Server on Azure VMs without fragmenting migration tooling or processes.&lt;/P&gt;
&lt;P&gt;The result is a flexible, scalable, and consistent migration experience that supports hybrid environments, reduces operational overhead, and enables modernization at a controlled and predictable pace.&lt;/P&gt;
&lt;H3&gt;One Integrated Migration Journey&lt;/H3&gt;
&lt;P&gt;A core value of SQL Server migration in Azure Arc is that the entire migration lifecycle is managed from one place. Once a SQL Server instance is enabled by Azure Arc, readiness can be assessed, a migration target selected, a migration method chosen, progress monitored, and cutover completed directly in the Azure portal.&lt;/P&gt;
&lt;P&gt;This approach removes the need for disconnected tools or custom orchestration. The only prerequisite remains unchanged: the source SQL Server needs to be enabled by Azure Arc. From there, migration is fully integrated into the Azure Arc SQL experience.&lt;/P&gt;
&lt;H3&gt;A Consistent Experience Across Migration Targets&lt;/H3&gt;
&lt;P&gt;The migration experience for SQL Server on Azure Virtual Machines follows the same model already available for Azure SQL Managed Instance migrations in Azure Arc. The same guided workflow, migration dashboard, and monitoring capabilities are used regardless of the selected target.&lt;/P&gt;
&lt;P&gt;This consistency is intentional. It allows teams to choose the destination that best fits their technical, operational, or regulatory requirements without having to learn a new migration process. Whether migrating to a fully managed PaaS service or to SQL Server on Azure infrastructure, the experience remains predictable and familiar.&lt;/P&gt;
&lt;img /&gt;
&lt;H3&gt;Backup Log Shipping Migration to SQL Server in Azure VM&lt;/H3&gt;
&lt;P&gt;Migration to SQL Server on Azure Virtual Machines is based on &lt;STRONG&gt;backup and restore&lt;/STRONG&gt;, specifically using &lt;STRONG&gt;log shipping mechanism&lt;/STRONG&gt;. This is a well-established approach for online migrations that minimizes downtime while maintaining control over the cutover window.&lt;/P&gt;
&lt;P&gt;In this model, database backups need to be uploaded from the source SQL Server to Azure Blob Storage. The migration engine will restore the initial full backup followed by ongoing transaction log and diff. backups. Azure Blob Storage acts as the intermediary staging location between the source and the target.&lt;/P&gt;
&lt;P&gt;The Azure Blob Storage account and the target SQL Server running on an Azure Virtual Machine must be co-located in the same Azure region&lt;STRONG&gt;.&lt;/STRONG&gt; This regional alignment is required to ensure efficient data transfer, reliable restore operations, and predictable migration performance.&lt;/P&gt;
&lt;P&gt;Within the Azure Arc migration experience, a simple and guided UX is used to select the Azure Blob Storage container that holds the backup files. Both the selected storage account and the Azure VM hosting SQL Server must reside in the same Azure region.&lt;/P&gt;
&lt;P&gt;Once the migration job is started, Azure Arc automatically restores the backup files to SQL Server on the Azure VM. As new log backups are uploaded to Blob Storage, they are continuously detected and applied to the target database, keeping it closely synchronized with the source.&lt;/P&gt;
&lt;H3&gt;Controlled Cutover on Your Terms&lt;/H3&gt;
&lt;P&gt;This automated restore process continues until the final cutover is initiated. When the cutover command is issued, Azure Arc applies the final backup to the target SQL Server on the Azure Virtual Machine and completes the migration.&lt;/P&gt;
&lt;P&gt;The target database is then brought online, and applications can be redirected to the new environment. This controlled cutover model allows downtime to be planned precisely, rather than being dictated by long-running restore operations.&lt;/P&gt;
&lt;H3&gt;Getting started&lt;/H3&gt;
&lt;P&gt;To get started, &lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/deployment-options" target="_blank" rel="noopener"&gt;Arc enable you SQL Server&lt;/A&gt;. Then, in the Azure portal, navigate to your Arc enabled SQL Server and select Database migration under the Migration menu on the left. For more information, see the &lt;A href="https://learn.microsoft.com/en-us/sql/sql-server/azure-arc/migration-overview" target="_blank" rel="noopener"&gt;SQL Server migration in Azure Arc&lt;/A&gt; documentation.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 22:55:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-data-migration-blog/expanding-azure-arc-sql-migration-with-a-new-target-sql-server/ba-p/4508564</guid>
      <dc:creator>danimir</dc:creator>
      <dc:date>2026-04-03T22:55:58Z</dc:date>
    </item>
    <item>
      <title>Windows news you can use: March 2026</title>
      <link>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-news-you-can-use-march-2026/ba-p/4495553</link>
      <description>&lt;P&gt;This month, our Windows team shared a candid update on how we're thinking about Windows quality, what's changing behind the scenes, and how your real-world feedback is shaping the platform. It's all in a post entitled&lt;A href="https://blogs.windows.com/windows-insider/2026/03/20/our-commitment-to-windows-quality/" target="_blank"&gt; Our commitment to Windows quality&lt;/A&gt;. Windows + Devices EVP Pavan Davuluri walks through how we identify issues, prioritize fixes, and how the Windows Insider community helps make Windows more reliable before updates reach production environments. It's a helpful read if you're interested in learning more about how we build, measure, and strengthen Windows quality.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Now on to more highlights from March in this month's edition of Windows news you can use.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;New in Windows update and device management&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;[AUTOPATCH] – &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-autopatch-update-readiness-brings-insights-to-it/4497611" target="_blank"&gt;Windows Autopatch update readiness is now generally available&lt;/A&gt;. It includes new capabilities to help you proactively detect and remediate device update issues. Reduce downtime, improve update success, and lower the security risk that comes from devices that aren't up to date.&lt;/LI&gt;
&lt;LI&gt;[HOTPATCH] – Windows Autopatch is enabling &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/securing-devices-faster-with-hotpatch-updates-on-by-default/4500066" target="_blank"&gt;hotpatch updates by default&lt;/A&gt; starting with the May 2026 security update. This change in default behavior will come to all eligible devices in Microsoft Intune and those accessing the service via Microsoft Graph API. New controls are available for those organizations that aren't ready to have hotpatch updates enabled by default.&lt;/LI&gt;
&lt;LI&gt;[RSAT] – Remote Server Administration Tools (RSAT) are now officially &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/rsat-capabilities-arrive-on-arm-based-windows-11-pcs/4500663" target="_blank"&gt;supported on Arm-based Windows 11 PCs&lt;/A&gt;. You can now remotely manage Windows server roles and features using Windows devices built on Arm processors, just as you would with traditional x64-based PCs.&lt;/LI&gt;
&lt;LI&gt;[SECURE BOOT] – The March 2026 security update introduces two new PowerShell features to help you manage the ongoing Secure Boot certificate rollout. The Get-SecureBootUEFI cmdlet now supports the -Decoded option, which displays Secure Boot certificates in a readable format. The Get-SecureBootSVN cmdlet lets you check the Secure Boot Security Version Number (SVN) of your device's UEFI firmware and bootloader. Use it to report whether the device follows the latest Secure Boot policy.&lt;/LI&gt;
&lt;LI&gt;[PRINT] – Instead of requiring device-specific drivers, Windows is now released with &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/building-a-modern-secure-and-seamless-print-experience-for-windows/4499051" target="_blank"&gt;a single, universal, inbox-class driver&lt;/A&gt; based on the industry standard IPP protocol and Mopria certification. If you're using a traditional x64 PC, including the latest Copilot+ PC running on Arm-based silicon, the print experience is the same: plug in (or connect over the network) and print.&lt;/LI&gt;
&lt;LI&gt;[W365] – &lt;A href="https://learn.microsoft.com/windows-365/enterprise/introduction-windows-365-frontline#windows-365-frontline-in-shared-mode" target="_blank"&gt;Windows 365 Frontline in shared mode&lt;/A&gt; is now available in Brazil South, Italy North, West Europe, New Zealand North, Mexico Central, Europe, Norway East, France Central, Spain Central, Germany West Central, and Switzerland North. Windows 365 is now available for Government Community Cloud (GCC &amp;amp; GCC-High) organizations in the &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-365-available-in-us-gov-texas-for-government-community-cloud-customers/4500042" target="_blank"&gt;US Gov Texas region&lt;/A&gt;. In addition, &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/announcing-multi%E2%80%91region-selection-for-windows-365-in-government-community-cloud/4500043" target="_blank"&gt;multi-region selection&lt;/A&gt; is now available for Windows 365 GCC &amp;amp; GCC-High.&lt;/LI&gt;
&lt;LI&gt;[RDP] – Microsoft recently released a sample repository demonstrating &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/announcing-the-rdp-dynamic-virtual-channel-plugin-samples/4501337" target="_blank"&gt;how to build Remote Desktop Protocol (RDP) plugins&lt;/A&gt; using modern tools and development patterns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;New in Windows security&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;[DRIVERS] – Starting with the April 2026 security update, Microsoft is removing trust for all kernel drivers signed by the deprecated cross-signed root program. This update will help ensure that by default, you can only load kernel drivers the Windows Hardware Compatibility Program (WHCP) passes and signs. This &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-driver-security-removing-trust-for-the-cross-signed-driver-pro/4504818" target="_blank"&gt;new kernel trust policy&lt;/A&gt; applies to devices running Windows 11 and Windows Server 2025.&lt;/LI&gt;
&lt;LI&gt;[SECURE BOOT] – Catch up on the latest FAQs by watching the March edition of &lt;A href="https://techcommunity.microsoft.com/event/windowsevents/ask-microsoft-anything-secure-boot---april-2026/4501308" target="_blank"&gt;Secure Boot: Ask Microsoft Anything (AMA)&lt;/A&gt; on demand. The next AMA will be April 23, 2026. &lt;A href="https://techcommunity.microsoft.com/event/windowsevents/ask-microsoft-anything-secure-boot---april-2026/4501308" target="_blank"&gt;Save the date&lt;/A&gt; and post your questions in advance or during the live event. New guidance and resources are now available, including:
&lt;UL&gt;
&lt;LI&gt;Video deep dive: &lt;A href="https://techcommunity.microsoft.com/event/windowsevents/secure-boot-certificate-updates-explained/4490529" target="_blank"&gt;Secure Boot certificate updates explained&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Guide: &lt;A href="https://support.microsoft.com/topic/secure-boot-troubleshooting-guide-5d1bf6b4-7972-455a-a421-0184f1e1ed7d" target="_blank"&gt;Secure Boot troubleshooting&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Reference: &lt;A href="https://support.microsoft.com/topic/a-closer-look-at-the-high-confidence-database-32382469-4505-4ed4-915b-982eff09b5d2" target="_blank"&gt;A closer look at the high confidence database&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Documentation and sample PowerShell scripts: &lt;A href="https://support.microsoft.com/topic/sample-secure-boot-e2e-automation-guide-f850b329-9a6e-40d1-823a-0925c965b8a0" target="_blank"&gt;Sample Secure Boot E2E automation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Guide: &lt;A href="https://support.microsoft.com/topic/it-admin-guide-secure-boot-certificate-update-status-in-the-windows-security-app-fb8e2121-4402-433b-af8b-623760951fdb" target="_blank"&gt;Secure Boot certificate update status in the Windows Security app&lt;/A&gt;[SYSMON] – System Monitor (Sysmon) functionality is now &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/native-sysmon-functionality-coming-to-windows/4468112" target="_blank"&gt;natively available in Windows&lt;/A&gt;. Capture system events for threat detection and use custom configuration files to filter the events you want to monitor. Windows writes captured events to Windows Event Log, which allows security tools and other applications to use them.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;[WDS] As announced in January 2026, the Unattend.xml file used in hands‑free deployment with Windows Deployment Services (WDS) poses a vulnerability when transmitted over an unauthenticated RPC channel. Beginning with the April 2026 security update, the second phase of hardening changes for &lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0386" target="_blank"&gt;CVE-2026-0386&lt;/A&gt; begins. These changes will make hands‑free deployment disabled by default to enforce secure behavior. For detailed guidance, see &lt;A href="https://go.microsoft.com/fwlink/?linkid=2344403" target="_blank"&gt;Windows Deployment Services (WDS) Hands‑Free Deployment Hardening&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;New in AI&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;[W365] [AGENTS] – Curious about the difference between Windows 365 for Agents and Microsoft Agent 365? &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/unlocking-secure-agentic-productivity-with-windows-365-for-agents/4499149" target="_blank"&gt;Explore the distinct role of each product&lt;/A&gt; and learn how to use them together to run agentic workloads securely, at scale, and under enterprise governance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-top: 16px;"&gt;To learn about latest capabilities for Copilot+ PCs, visit the &lt;A href="https://www.microsoft.com/windows/business/roadmap" target="_blank"&gt;Windows Roadmap&lt;/A&gt; and filter Platform by "Copilot+ PC Exclusives."&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;New in Windows Server&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;For the latest features and improvements for Windows Server, see the &lt;A href="https://support.microsoft.com/topic/windows-server-2025-update-history-10f58da7-e57b-4a9d-9c16-9f1dcd72d7d7" target="_blank"&gt;Windows Server 2025 release notes&lt;/A&gt; and &lt;A href="https://support.microsoft.com/topic/windows-server-version-23h2-update-history-68c851ff-825a-4dbc-857b-51c5aa0ab248" target="_blank"&gt;Windows Server, version 23H2 release notes&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;[EVENT] – Save the date for the &lt;A href="https://techcommunity.microsoft.com/blog/windowsservernewsandbestpractices/save-the-date-windows-server-summit-%E2%80%93-may-11-13-2026/4501057" target="_blank"&gt;Windows Server Summit, May 11-13&lt;/A&gt;. RSVP for three days of practical, engineering-led guidance on real-world operations, security, and hybrid scenarios supported by live Q&amp;amp;A.&lt;/LI&gt;
&lt;LI&gt;[NVMe] – A &lt;A href="https://techcommunity.microsoft.com/blog/windowsservernewsandbestpractices/introducing-the-windows-nvme-of-initiator-preview-in-windows-server-insiders-bui/4501344" target="_blank"&gt;basic NVMe-over-Fabrics (NVMe-oF) initiator&lt;/A&gt; is available in the latest Windows Server Insiders build. This release introduces an in-box Windows initiator for NVMe/TCP and NVMe/RDMA, enabling early evaluation of networked NVMe storage using native Windows Server components.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;New in productivity and collaboration&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;Install the March 2026 security update for &lt;A href="https://support.microsoft.com/topic/march-10-2026-kb5079473-os-builds-26200-8037-and-26100-8037-9c222a8e-cc02-40d4-a1f8-ad86be1bc8b6" target="_blank"&gt;Windows 11, versions 25H2 and 24H2&lt;/A&gt; to get these and other capabilities, which will be rolling out gradually:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;[RECOVERY] – &lt;A href="https://support.microsoft.com/windows/quick-machine-recovery-in-windows-aa2852f4-e04e-4af4-9508-0addda165304" target="_blank"&gt;Quick Machine Recovery&lt;/A&gt; now turns on automatically for Windows Professional devices that are not domain‑joined and not enrolled in enterprise endpoint management. These devices receive the same recovery features available to Windows Home users. For domain‑joined or enterprise managed devices, Quick Machine Recovery stays off unless you enable it for your organization.&lt;/LI&gt;
&lt;LI&gt;[NETWORK] – A built‑in network speed test is now available from the taskbar. The speed test opens in the default browser and measures Ethernet, Wi‑Fi, and cellular connections.&lt;/LI&gt;
&lt;LI&gt;[CAMERA] – Control pan and tilt for supported cameras in the Settings app.&lt;/LI&gt;
&lt;LI&gt;[SEARCH] – Using search on the taskbar? Preview search results by hovering and quickly seeing when more results are available with group headers.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-top: 16px;"&gt;New features and improvements are coming in the April 2026 security update. You can preview them by installing the March 2026 optional non-security update for &lt;A href="https://support.microsoft.com/topic/march-26-2026-kb5079391-os-builds-26200-8116-and-26100-8116-preview-7c9e2275-b9ba-4068-aeb0-23da42b81d3b" target="_blank"&gt;Windows 11, versions 25H2 and 24H2&lt;/A&gt;. This update includes the gradual rollout of:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;[SECURITY] –You can turn Smart App Control on or off without needing a clean install.&lt;/LI&gt;
&lt;LI&gt;[SETTINGS] – The Settings &amp;gt; About page now provides a more structured and intuitive experience. Get clearer device specifications and easier navigation to related device components, including quick access to Storage settings.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Lifecycle reminders&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;Windows 10 Enterprise 2016 LTSB and Windows 10 IoT Enterprise 2016 LTSB will reach end of support on October 13, 2026. Windows Server 2016 will reach end of support on January 12, 2027. If your organization cannot migrate to newer, supported releases in time, &lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/plan-for-windows-server-2016-and-windows-10-2016-ltsb-end-of-support/4496136" target="_blank"&gt;explore the options available&lt;/A&gt; to help you keep your devices protected with monthly security updates. Extended Security Updates (ESU) are now available for purchase for Windows 10 Enterprise 2016 LTSB.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-top: 16px;"&gt;Check out our lifecycle documentation for the latest updates on &lt;A href="https://learn.microsoft.com/windows/whats-new/deprecated-features" target="_blank"&gt;Deprecated features in the Windows client&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/windows-server/get-started/removed-deprecated-features-windows-server-2025" target="_blank"&gt;Features removed or no longer developed starting with Windows Server 2025&lt;/A&gt;.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Additional resources&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;Looking for the latest news and previews for Windows, Copilot, Copilot+ PCs, the Windows and Windows Server Insider Programs, and more? Check out these resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/windows/business/roadmap" target="_blank"&gt;Windows Roadmap&lt;/A&gt; for new Copilot+ PCs and Windows features – filter by platform, version, status, and channel or search by feature name&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/copilot/microsoft-365/release-notes?tabs=all" target="_blank"&gt;Microsoft 365 Copilot release notes&lt;/A&gt; for latest features and improvements&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://blogs.windows.com/windows-insider/" target="_blank"&gt;Windows Insider Blog&lt;/A&gt; for what's available in the Canary, Dev, Beta, or Release Preview Channels&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/category/windows-server/discussions/windowsserverinsiders" target="_blank"&gt;Windows Server Insider&lt;/A&gt; for feature preview opportunities&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.microsoft.com/topic/understanding-update-history-for-windows-insider-preview-features-fixes-and-changes-bb9dd4b1-9d2b-4753-8b23-ce90e62f6845" target="_blank"&gt;Understanding update history for Windows Insider preview features, fixes, and changes&lt;/A&gt; to learn about the types of updates for Windows Insiders&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Join the conversation&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;If you're an IT admin with questions about managing and updating Windows, add our monthly &lt;A href="https://aka.ms/Windows/OfficeHours" target="_blank"&gt;Windows Office Hours&lt;/A&gt; to your calendar. We assemble a crew of Windows, Windows 365, security, and Intune experts to help answer your questions and provide tips on tools, best practices, and troubleshooting.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Finally, we're always looking to improve this monthly summary. Drop us a note in the Comments and let us know what we can do to make this more useful for you!&lt;/P&gt;
&lt;HR /&gt;
&lt;P style="font-size: 14px;"&gt;Continue the conversation. Find best practices. Bookmark the &lt;A href="http://aka.ms/community/Windows" target="_blank" rel="noopener"&gt;Windows Tech Community&lt;/A&gt;, then follow us &lt;A href="https://x.com/mswindowsitpro" target="_self"&gt;@MSWindowsITPro&lt;/A&gt; on X and on &lt;A href="https://www.linkedin.com/company/windows-it-pro" target="_blank" rel="noopener"&gt;LinkedIn&lt;/A&gt;. Looking for support? Visit &lt;A href="https://docs.microsoft.com/answers/products/windows#windows-client-for-it-pros" target="_blank" rel="noopener"&gt;Windows on Microsoft Q&amp;amp;A&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 21:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-news-you-can-use-march-2026/ba-p/4495553</guid>
      <dc:creator>Chris_Morrissey</dc:creator>
      <dc:date>2026-04-03T21:00:00Z</dc:date>
    </item>
    <item>
      <title>#IntuneForMSPs Meetup - June 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-intune-events/intuneformsps-meetup-june-2026/ec-p/4508553#M5932</link>
      <description>&lt;P&gt;Save the date for June's #IntuneForMSPs Community Meetup! These community‑driven events bring together MSPs, Microsoft MVPs, and Intune experts to discuss top‑of‑mind topics shaping device management today. You'll gain practical insights, explore real‑world lessons learned, and hear invaluable peer perspectives to help deepen your technical skills while exploring ways to grow and differentiate your MSP practice. Beyond the tech, the series also offers ideas for strengthening service offerings, refining go‑to‑market approaches, and building lasting connections across the MSP community.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Stay informed, stay connected&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Bookmark the &lt;A href="https://aka.ms/IntuneforMSPs" target="_blank" rel="noopener"&gt;Microsoft Intune for MSPs resource guide&lt;/A&gt;, your home for all things #IntuneForMSPs, for future session dates and resources to help you on your journey.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:55:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-intune-events/intuneformsps-meetup-june-2026/ec-p/4508553#M5932</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-03T20:55:34Z</dc:date>
    </item>
    <item>
      <title>From box to business‑ready with Windows Autopilot - #IntuneForMSPs Meetup</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-intune-events/from-box-to-business-ready-with-windows-autopilot-intuneformsps/ec-p/4508551#M5931</link>
      <description>&lt;P&gt;&lt;SPAN data-teams="true"&gt;Join us for the April #IntuneForMSPs community meetup featuring Microsoft MVP Steve Weiner. Steve will share practical, MSP-focused insights on using Windows Autopilot with Microsoft Intune to streamline device provisioning, reduce hands-on deployment time, and improve the onboarding experience for customers at scale. Learn real-world Windows Autopilot strategies that MSPs can apply immediately, common pitfalls to avoid, and tips on how to operationalize Windows Autopilot as part of a modern endpoint management practice.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Stay informed, stay connected&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Bookmark the &lt;A href="https://aka.ms/IntuneforMSPs" target="_blank" rel="noopener"&gt;Microsoft Intune for MSPs resource guide&lt;/A&gt;, your home for all things #IntuneForMSPs, for future session dates and resources to help you on your journey.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:48:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-intune-events/from-box-to-business-ready-with-windows-autopilot-intuneformsps/ec-p/4508551#M5931</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-03T20:48:56Z</dc:date>
    </item>
    <item>
      <title>#IntuneForMSPs Meetup - May 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-intune-events/intuneformsps-meetup-may-2026/ec-p/4508549#M5930</link>
      <description>&lt;P&gt;Save the date for May's #IntuneForMSPs Community Meetup! These community‑driven events bring together MSPs, Microsoft MVPs, and Intune experts to discuss top‑of‑mind topics shaping device management today. You'll gain practical insights, explore real‑world lessons learned, and hear invaluable peer perspectives to help deepen your technical skills while exploring ways to grow and differentiate your MSP practice. Beyond the tech, the series also offers ideas for strengthening service offerings, refining go‑to‑market approaches, and building lasting connections across the MSP community.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&lt;/H2&gt;
&lt;P&gt;Registration is not required. Add this event to your calendar and select &lt;STRONG&gt;Attend&lt;/STRONG&gt; to receive reminders. Post your questions in advance, or any time during the live broadcast.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Stay informed, stay connected&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Bookmark the &lt;A href="https://aka.ms/IntuneforMSPs" target="_blank" rel="noopener"&gt;Microsoft Intune for MSPs resource guide&lt;/A&gt;, your home for all things #IntuneForMSPs, for future session dates and resources to help you on your journey.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:45:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-intune-events/intuneformsps-meetup-may-2026/ec-p/4508549#M5930</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-03T20:45:11Z</dc:date>
    </item>
    <item>
      <title>Introducing TSGen: Automated TSG Generation @ Scale – Built by AI</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/introducing-tsgen-automated-tsg-generation-scale-built-by-ai/ba-p/4508191</link>
      <description>&lt;P&gt;&lt;EM&gt;This post is a follow-up to the previous write-up at &lt;A href="https://techcommunity.microsoft.com/blog/azure-ai-foundry-blog/the-future-of-ai-autonomous-agents-for-identifying-the-root-cause-of-cloud-servi/4412494?previewMessage=true" target="_blank" rel="noopener"&gt;https://techcommunity.microsoft.com/blog/azure-ai-foundry-blog/the-future-of-ai-autonomous-agents-for-identifying-the-root-cause-of-cloud-servi/4412494?previewMessage=true&lt;/A&gt;. If you haven’t read it yet, it provides the background on why we started building TSGen, our Troubleshooting Guide Generator, and the core idea behind automated, scalable generation. This post outlines how we built TSGen on a cross-discipline team using AI for both research and engineering workflows, focusing on the core algorithm and some preliminary results.&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;The Challenge: Why Manual Troubleshooting Guides Fall Short&lt;/H1&gt;
&lt;P&gt;Operating cloud services at scale presents unique challenges for incident management. When issues arise, engineers rely on Troubleshooting Guides (TSGs) to diagnose and resolve problems quickly. However, manual TSG creation and maintenance can occasionally create bottlenecks. TSGs are often siloed across different platforms, making them difficult to locate during critical incidents. The content itself tends to be inconsistently structured between silos and occasionally incomplete, requiring engineers to interpret ambiguous instructions under time pressure. We ran an internal study examining over 4,000 TSGs mapped to thousands of incidents that revealed that while TSGs significantly reduce mitigation efforts when properly maintained, their quality varies dramatically. Engineers surveyed about TSG effectiveness consistently report issues with outdated information, missing steps, and lack of clarity. These quality gaps lead to extended incident resolution times, increased engineer fatigue, and higher operational costs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 1: Categorizing Weight of TSG Aspects on Time to Mitigate and On-Call Experience&lt;/img&gt;
&lt;H1&gt;The Solution: Automating Troubleshooting Guide creation with AI&lt;/H1&gt;
&lt;P&gt;The core technical innovation is the use of an AI system that &lt;EM&gt;automatically synthesizes high‑quality, structured Troubleshooting Guides (TSGs) directly from historical incident data&lt;/EM&gt;, rather than relying on manual authoring. TSGen ingests diverse operational signals—such as past IcM incidents identified via monitor IDs or custom Kusto queries—and produces end‑to‑end, action‑oriented troubleshooting workflows within minutes. This shifts TSG creation from a labor‑intensive, error‑prone documentation task into an automated knowledge synthesis problem, enabling consistent structure and coverage across services.&lt;/P&gt;
&lt;P&gt;A second key innovation is operational scalability with continuous relevance. TSGen is designed not only to generate new TSGs, but to keep them up‑to‑date as new incidents occur, addressing the chronic issue of stale or incomplete troubleshooting documentation. The system has already demonstrated practical effectiveness in pilot deployments, with dozens of generated TSGs accepted and published for real on‑call usage, showing that AI‑generated artifacts can meet production engineering standards rather than serving as drafts or suggestions.&lt;/P&gt;
&lt;P&gt;Finally, TSGen explicitly targets dual consumption by humans and AI agents, generating structured outputs that are useful both for on‑call engineers and for automated agents involved in incident diagnosis. This positions TSGs as a shared, machine‑readable knowledge layer rather than static documents, reducing “tribal knowledge” and enabling faster, more reliable incident response at scale across Microsoft services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 2: Zero-ing in on the most common issues found in TSGs&lt;/P&gt;
&lt;/img&gt;
&lt;H1&gt;TSGen's Five-Step Automated Workflow&lt;/H1&gt;
&lt;P&gt;TSGen addresses the manual TSG challenge through a sophisticated five-step automated workflow that transforms incident data into executable troubleshooting guides. The first step, Collection, gathers incident data from multiple sources including diagnostic logs, historical tickets, and troubleshooting documentation. This comprehensive data aggregation creates the foundation for intelligent TSG generation. The second step, Filtering, removes noise and irrelevant information from the collected data. Machine learning algorithms identify which incident attributes are most relevant for troubleshooting, eliminating false signals that could lead to incorrect guidance. The third step, Core Incident Selection, identifies representative incidents that exemplify common problem patterns. Rather than processing every incident individually, TSGen selects the most informative examples that capture the essential troubleshooting logic. The fourth step, Data Distillation, extracts key troubleshooting patterns and actionable steps from the selected incidents. This process analyzes successful resolution paths to identify the critical diagnostic checks and mitigation actions. The fifth and final step, TSG Generation, synthesizes the distilled information into structured, actionable troubleshooting guides. The output is a well-formatted TSG that engineers can follow systematically during incident response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 3: The TSGen Five-Step Workflow&lt;/img&gt;
&lt;H1&gt;From Manual to Automated: Real-World Impact&lt;/H1&gt;
&lt;P&gt;The shift from manual TSG creation to automated TSG maintenance delivers measurable benefits for incident management operations. Teams using automated TSG maintenance report significant reductions in time-to-mitigation for common incident types. Engineers spend less time searching for relevant documentation and interpreting ambiguous instructions by ensuring that all TSGs have consistent formatting and reliable information, allowing them to focus on complex problem-solving.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 4: With The Presence of a TSG, Incident Mitigation time decreases by ~40%&lt;/img&gt;
&lt;H1&gt;Industry-Wide Implications for Cloud Operations&lt;/H1&gt;
&lt;P&gt;TSGen represents a broader trend toward intelligent automation in cloud operations. The challenges of maintaining high service availability while managing complex distributed systems affect organizations across industries. As cloud infrastructure grows in scale and complexity, the volume of potential incidents increases exponentially. Traditional manual approaches cannot keep pace with this growth. Automated TSG generation offers a scalable solution that improves with the volume of data it processes. Each incident handled by the system contributes to its collection of incident knowledge, creating a positive feedback loop for ever improving TSGs. This scalability benefit is particularly valuable for organizations operating multiple services or supporting global customer bases. The technology also democratizes incident management expertise. In traditional models, effective troubleshooting requires deep institutional knowledge that takes years to develop. Automated systems capture and codify this expertise, making it accessible to engineers at all experience levels. This knowledge transfer capability reduces dependency on veteran engineers and accelerates onboarding for new team members.&lt;/P&gt;
&lt;H1&gt;Key Benefits of Automated TSG Generation&lt;/H1&gt;
&lt;P&gt;Automated TSG generation delivers multiple strategic advantages for organizations managing cloud infrastructure:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Faster incident resolution reduces service disruptions and improves customer experience&lt;/LI&gt;
&lt;LI&gt;Improved TSG quality through continuous learning ensures troubleshooting guidance remains accurate and comprehensive&lt;/LI&gt;
&lt;LI&gt;Reduced operational costs result from decreased manual documentation maintenance and shorter incident durations&lt;/LI&gt;
&lt;LI&gt;Enhanced engineer productivity allows technical teams to focus on innovation rather than repetitive troubleshooting tasks&lt;/LI&gt;
&lt;LI&gt;Knowledge preservation captures institutional expertise in executable form, protecting organizations from knowledge loss when engineers transition&lt;/LI&gt;
&lt;LI&gt;Scalability enables consistent incident management across growing infrastructure without proportional headcount increases&lt;/LI&gt;
&lt;LI&gt;Data-driven insights from automated systems reveal patterns in incident types and resolution effectiveness, informing preventive measures&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;How We Built This Iteration&lt;/H1&gt;
&lt;P&gt;This iteration was developed in VS Code using Copilot CLI, with Claude models (including Opus 4.6) for implementation support and rapid iteration. This new iteration was primarily focused on improving output quality from the core algorithm, improving engineering efficiency / speed of iteration by migrating from Node.js to Python to simplify the codebase and speed up experimentation, and in deploying a new agentic playground to make it easier for teams across Microsoft to experiment and help beta test.&lt;/P&gt;
&lt;H1&gt;Learnings and Recommendations from Building with AI&lt;/H1&gt;
&lt;P&gt;This iteration was both a research and an engineering project. Our cross-discipline team leveraged AI at every level of development. The majority of the code that we developed for this new iteration was created by AI, allowing us to iterate and develop faster. A few practical learnings helped us get better outcomes and avoid rework:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create a solid plan up front for each major change.
&lt;UL&gt;
&lt;LI&gt;We used the “Plan” mode in VS Code to have Claude AI models assist in defining what we want to make in a way that AI can leverage.&lt;/LI&gt;
&lt;LI&gt;For example, when we converted the codebase from NodeJS to Python, we made a new dedicated plan.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Be detailed in the initial description and write down explicit requirements as bullet points (including edge cases and non-goals).
&lt;UL&gt;
&lt;LI&gt;Our initial prompt to generate the plan was quite long. However, it was not highly structured. We focused primarily on getting the information into the AI, rather than giving it an actual handmade plan.&lt;/LI&gt;
&lt;LI&gt;For example, we included snippets such as what the new folder structure should be and that there should be no regressions in functionality.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;If you already know how you want something to work, state it directly - specific instructions beat vague intent.
&lt;UL&gt;
&lt;LI&gt;Often models can produce solutions that you weren’t expecting. This can be good at times and inconvenient at other times. So, if you know what your end goal looks like, give code pointers and specific details for what functions should be named, what they should do, etc.&lt;/LI&gt;
&lt;LI&gt;During plan creation, answer follow-up questions with as much context as you can, so assumptions don’t creep in.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Often times when designing a plan, the AI will ask some follow up questions. We treated these as an opportunity to elaborate. When the model asks for a follow up, don’t be shy to give it a lot of information. This can help make sure that it delivers a result similar to what you are expecting.
&lt;UL&gt;
&lt;LI&gt;Read the plan critically and “negotiate” it as you go—treat the AI like a junior developer and make expectations explicit.&lt;/LI&gt;
&lt;LI&gt;After you have a plan, make sure to read it fully to ensure that little miscommunications don’t occur. This is similar to the previous point, where you want to make sure that everything is sufficiently detailed but also that the details align with what you are trying to create.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;If a model isn’t producing good results, switch models and try again.
&lt;UL&gt;
&lt;LI&gt;Sometimes bringing in a new model can have the same effect as bringing in a different engineer with a fresh set of eyes. Especially given the speed of release for new models.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;When the model is missing context, give hints about where to look (files, folders, examples, or the specific component to start from) so it can ground its plan.
&lt;UL&gt;
&lt;LI&gt;If a model is asking questions or creating code that does not align with your interpretation of the plan, try to ground the plan in examples. This can help drastically clear up the miscommunications.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Looking Forward: The Future of Intelligent Incident Management&lt;/H1&gt;
&lt;P&gt;The evolution of TSG automation points toward increasingly autonomous incident management systems. Current systems like TSGen focus on automating TSG generation and execution for known incident patterns. Future developments will likely expand into autonomous root cause analysis and predictive incident prevention. Advanced AI agents could execute complex diagnostic workflows without human intervention, escalating only when novel situations arise that require human judgment. Natural language processing capabilities will enable engineers to interact with troubleshooting systems conversationally, asking questions and receiving context-aware guidance. The integration of reinforcement learning could allow systems to optimize troubleshooting strategies in real-time based on success rates. These systems might automatically adjust their approaches when initial steps prove ineffective, exploring alternative resolution paths intelligently. Another promising direction involves cross-system learning, where troubleshooting knowledge from one service or organization informs incident management in others. This collective intelligence approach could accelerate the development of effective troubleshooting strategies industry-wide. The ultimate vision is incident management systems that continuously improve, require minimal human oversight, and prevent problems before they impact customers.&lt;/P&gt;
&lt;H1&gt;Further Reading&lt;/H1&gt;
&lt;P&gt;- &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/azure-ai-foundry-blog/the-future-of-ai-autonomous-agents-for-identifying-the-root-cause-of-cloud-servi/4412494?previewMessage=true" target="_blank" rel="noopener" data-lia-auto-title="How Microsoft is Using AI Agents to Transform Cloud Incident Management" data-lia-auto-title-active="0"&gt;How Microsoft is Using AI Agents to Transform Cloud Incident Management&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- &lt;A href="https://arxiv.org/pdf/2205.13457" target="_blank" rel="noopener"&gt;AutoTSG: Learning and Synthesis for Incident Troubleshooting&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:18:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-foundry-blog/introducing-tsgen-automated-tsg-generation-scale-built-by-ai/ba-p/4508191</guid>
      <dc:creator>Daniel-Genkin-MSFT</dc:creator>
      <dc:date>2026-04-03T20:18:41Z</dc:date>
    </item>
    <item>
      <title>Removing Old MS 365 Account</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-365/removing-old-ms-365-account/m-p/4508545#M59144</link>
      <description>&lt;P&gt;I had a Office 365 account under the discontinued educational organization license. The cloud storage was supposed to be disabled by MS at some point. So, I bought a personal Ofc 365 subscription.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to remove references to the old account and register my new license under a different email address, however my machine is still ate up with it, it still tries to save documents to that supposedly disabled Onedrive location and Office applications still confuse it. I scanned the system registry and there are hundreds of references to the old account &amp;amp; configuration. This is a problem on several of my home machines.&lt;/P&gt;&lt;P&gt;How do I totally nuke that old account?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:10:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-365/removing-old-ms-365-account/m-p/4508545#M59144</guid>
      <dc:creator>bcole1</dc:creator>
      <dc:date>2026-04-03T20:10:50Z</dc:date>
    </item>
    <item>
      <title>Run the latest Azure Arc agent with Automatic Agent Upgrade (Public Preview)</title>
      <link>https://techcommunity.microsoft.com/t5/azure-arc-blog/run-the-latest-azure-arc-agent-with-automatic-agent-upgrade/ba-p/4508535</link>
      <description>&lt;P&gt;Customers managing large fleets of Azure Arc servers need a scalable way to ensure the Azure Arc agent stays up to date without manual intervention. Per server configuration does not scale, and gaps in upgrade coverage can lead to operational drift, missed features, and delayed security updates.&lt;/P&gt;
&lt;P&gt;To address this, we’re introducing two new options to help customers enable Automatic Agent Upgrade at scale: applied as a built-in Azure Policy and a new onboarding CLI flag.&lt;/P&gt;
&lt;P&gt;The built-in policy makes it easy to check whether Automatic Agent Upgrade is enabled across a given scope and automatically remediates servers that are not compliant.&lt;/P&gt;
&lt;P&gt;For servers being newly onboarded, customers can enable the feature at onboarding by adding the &lt;STRONG&gt;--enable-automatic-upgrade&lt;/STRONG&gt; flag to the &lt;STRONG&gt;azcmagent connect&lt;/STRONG&gt; command, ensuring the agent is configured correctly from the start.&lt;/P&gt;
&lt;H1&gt;What is Automatic Agent Upgrade?&lt;/H1&gt;
&lt;P&gt;Automatic Agent Upgrade is a feature, in public preview, that automatically keeps the Azure Connected Machine agent (Arc agent) up to date. Updates are managed by Microsoft, so once enabled, customers no longer need to manually manage agent upgrades.&lt;/P&gt;
&lt;P&gt;By always running the latest agent version, customers receive all the newest capabilities, security updates, and bug fixes as soon as they’re released. Learn more: &lt;A href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/agent-release-notes" target="_blank"&gt;What's new with Azure Connected Machine agent - Azure Arc | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;H1&gt;Getting Started&lt;/H1&gt;
&lt;H2&gt;Apply automatic agent upgrade policy&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Navigate to the ‘Policy’ blade in the &lt;A href="https://portal.azure.com/" target="_blank"&gt;Azure Portal&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Navigate to the ‘Compliance’ section and click ‘Assign Policy’&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Fill out the required sections
&lt;UL&gt;
&lt;LI&gt;Scope: Subscription and resource group (optional) that policy will apply to&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Policy definition: &lt;STRONG&gt;Configure Azure Arc-enabled Servers to enable automatic upgrades&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;Navigate to the ‘Remediation’ tab and check the box next to ‘Create a remediation task’&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;Navigate to the ‘Review + create’ tab and press ‘Create’. The Policy has been successfully applied to the scope.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For more information on this process, please visit this article &lt;A href="https://learn.microsoft.com/en-us/azure/governance/policy/assign-policy-portal#create-a-policy-assignment" target="_blank"&gt;Quickstart: Create policy assignment using Azure portal - Azure Policy | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Apply automatic agent upgrade CLI Flag&lt;/H2&gt;
&lt;P&gt;Adding the following flag enables automatic agent upgrade during onboarding&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;--enable-automatic-upgrade&lt;/LI-CODE&gt;
&lt;P&gt;While this flag can be used on a single server, it can also be applied at scale using one of the existing Azure Arc at scale onboarding methods and adding the flag &lt;A href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/onboard-service-principal?tabs=portal" target="_blank"&gt;Connect hybrid machines to Azure at scale - Azure Arc | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Here is an at scale onboarding sample using a basic script.&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;azcmagent connect --resource-group {rg} --location {location} --subscription-id {subid} --service-principal-id {service principal id} --service-principal-secret {service principal secret} --tenant-id {tenant id} --enable-automatic-upgrade&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get started with this feature or learn more, please refer to this article &lt;A href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/manage-agent?tabs=windows#automatic-agent-upgrade-preview" target="_blank"&gt;Manage and maintain the Azure Connected Machine agent - Azure Arc | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 19:30:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-arc-blog/run-the-latest-azure-arc-agent-with-automatic-agent-upgrade/ba-p/4508535</guid>
      <dc:creator>yunishussein</dc:creator>
      <dc:date>2026-04-03T19:30:06Z</dc:date>
    </item>
    <item>
      <title>Secure HTTP‑Only AKS Ingress with Azure Front Door Premium, Firewall DNAT, and Private AGIC</title>
      <link>https://techcommunity.microsoft.com/t5/azure-architecture-blog/secure-http-only-aks-ingress-with-azure-front-door-premium/ba-p/4508167</link>
      <description>&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;Reference architecture and runbook (Part 1: HTTP-only) for Hub-Spoke networking with private Application Gateway (AGIC), Azure Firewall DNAT, and Azure Front Door Premium (WAF)&lt;/P&gt;
&lt;H2&gt;0. When and Why to Use This Architecture&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Series note:&lt;/STRONG&gt; This document is &lt;STRONG&gt;Part 1&lt;/STRONG&gt; and uses &lt;STRONG&gt;HTTP&lt;/STRONG&gt; to keep the focus on routing and control points. A follow-up &lt;STRONG&gt;Part 2&lt;/STRONG&gt; will extend the same architecture to &lt;STRONG&gt;HTTPS&lt;/STRONG&gt; (end-to-end TLS) with the recommended certificate and policy configuration.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What this document contains&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scope:&lt;/STRONG&gt; Architecture overview and traffic flow, build/run steps, sample Kubernetes manifests, DNS configuration, and validation steps for end-to-end connectivity through Azure Front Door → Azure Firewall DNAT → private Application Gateway (AGIC) → AKS.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Typical scenarios&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Private-by-default &lt;/STRONG&gt;&lt;STRONG&gt;Kubernetes ingress:&lt;/STRONG&gt; You want application ingress without exposing a public Application Gateway or public load balancer for the cluster.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Centralized hub ingress and inspection:&lt;/STRONG&gt; You need a shared Hub VNet pattern with centralized inbound control (NAT, allow-listing, inspection) for one or more spoke workloads.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Global entry point + edge WAF:&lt;/STRONG&gt; You want a globally distributed frontend with WAF, bot/rate controls, and consistent L7 policy before traffic reaches your VNets.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Controlled origin exposure:&lt;/STRONG&gt; You need to ensure only the edge service can reach your origin (firewall public IP), and all other inbound sources are blocked.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Key benefits (the “why”)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Layered security:&lt;/STRONG&gt; WAF blocks common web attacks at the edge; the hub firewall enforces network-level allow lists and DNAT; App Gateway applies L7 routing to AKS.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduced public attack surface:&lt;/STRONG&gt; Application Gateway and AKS remain private; only Azure Front Door and the firewall public IP are internet-facing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hub-spoke scalability:&lt;/STRONG&gt; The hub pattern supports multiple spokes and consistent ingress controls across workloads.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Operational clarity:&lt;/STRONG&gt; Clear separation of responsibilities (edge policy vs. network boundary vs. app routing) makes troubleshooting and governance easier.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;When not to use this&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Simple dev/test exposure:&lt;/STRONG&gt; If you only need quick internet access, a public Application Gateway or public AKS ingress may be simpler and cheaper.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;You require end-to-end TLS in this lab:&lt;/STRONG&gt; This runbook is HTTP-only for learning; production designs should use HTTPS throughout.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;You do not need hub centralization:&lt;/STRONG&gt; If there is only one workload and no hub-spoke standardization requirement, the firewall hop may be unnecessary.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites and assumptions&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Series scope:&lt;/STRONG&gt; &lt;STRONG&gt;Part 1&lt;/STRONG&gt; is &lt;STRONG&gt;HTTP-only&lt;/STRONG&gt; to focus on routing and control points. &lt;STRONG&gt;Part 2&lt;/STRONG&gt; will cover &lt;STRONG&gt;HTTPS&lt;/STRONG&gt; (end-to-end TLS) and the certificate/policy configuration typically required for production deployments.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Permissions:&lt;/STRONG&gt; Ability to create VNets, peerings, Azure Firewall + policy, Application Gateway, AKS, and Private DNS (typically Contributor on the subscription/resource groups).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Networking:&lt;/STRONG&gt; Hub-Spoke VNets with peering configured to allow forwarded traffic, plus name resolution via Private DNS.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Tools:&lt;/STRONG&gt; Azure CLI, kubectl, and permission to enable the AKS AGIC addon.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Architecture Diagram&lt;/STRONG&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;1. Architecture Components and Workflow&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Workflow (end-to-end request path)&lt;/STRONG&gt;&lt;BR /&gt;Client → Azure Front Door (WAF + TLS, public endpoint) → Azure Firewall public IP (Hub VNet; DNAT) → private Application Gateway (Spoke VNet; AGIC-managed) → AKS service/pods.&lt;/P&gt;
&lt;H3&gt;1.1 Network topology (Hub-Spoke)&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Connectivity&lt;/STRONG&gt;&lt;BR /&gt;Hub and Spoke VNets are connected via &lt;STRONG&gt;VNet peering&lt;/STRONG&gt; with &lt;STRONG&gt;forwarded traffic&lt;/STRONG&gt; allowed so Azure Front Door traffic can traverse Azure Firewall DNAT to the private Application Gateway, and Hub-based validation hosts can resolve private DNS and reach Spoke private IPs.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hub VNet&lt;/STRONG&gt; (10.0.0.0/16)&lt;BR /&gt;&lt;STRONG&gt;Purpose:&lt;/STRONG&gt; Central ingress and shared services. The Hub hosts the security boundary (Azure Firewall) and optional connectivity/management components used to reach and validate private resources in the Spoke.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Firewall&lt;/STRONG&gt; in &lt;STRONG&gt;AzureFirewallSubnet&lt;/STRONG&gt; (10.0.1.0/24); example private IP 10.0.1.4 with a &lt;STRONG&gt;Public IP&lt;/STRONG&gt; used as the Azure Front Door origin and for inbound DNAT.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Bastion&lt;/STRONG&gt; (optional) in &lt;STRONG&gt;AzureBastionSubnet&lt;/STRONG&gt; (10.0.2.0/26) for browser-based access to test VMs without public IPs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Test VM subnet&lt;/STRONG&gt; (optional) &lt;STRONG&gt;testvm-subnet&lt;/STRONG&gt; (10.0.3.0/24) for in-VNet validation (for example, nslookup and curl against the private App Gateway hostname).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Spoke VNet&lt;/STRONG&gt; (10.224.0.0/12)&lt;BR /&gt;&lt;STRONG&gt;Purpose:&lt;/STRONG&gt; Hosts private application workloads (AKS) and the private layer-7 ingress (Application Gateway) that is managed by AGIC.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AKS subnet&lt;/STRONG&gt; &lt;STRONG&gt;aks-subnet&lt;/STRONG&gt;: 10.224.0.0/16 (node pool subnet for the AKS cluster).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application Gateway subnet&lt;/STRONG&gt; &lt;STRONG&gt;appgw-subnet&lt;/STRONG&gt;: 10.238.0.0/24 (dedicated subnet for a &lt;STRONG&gt;private&lt;/STRONG&gt; Application Gateway; example private frontend IP 10.238.0.10).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AKS + AGIC&lt;/STRONG&gt;: AGIC programs listeners/rules on the private Application Gateway based on Kubernetes Ingress resources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;1.2 Azure Front Door (Frontend)&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Role:&lt;/STRONG&gt; Public entry point for the application, providing global anycast ingress, TLS termination, and Layer 7 routing to the origin (Azure Firewall public IP) while keeping Application Gateway private.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;SKU:&lt;/STRONG&gt; Use &lt;STRONG&gt;Azure Front Door Premium&lt;/STRONG&gt; when you need WAF plus advanced security/traffic controls; Standard also supports WAF, but Premium is typically chosen for broader capabilities and enterprise patterns.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;WAF support:&lt;/STRONG&gt; Azure Front Door supports WAF with &lt;STRONG&gt;managed rule sets&lt;/STRONG&gt; and &lt;STRONG&gt;custom rules&lt;/STRONG&gt; (for example, allow/deny lists, geo-matching, header-based controls, and rate limiting policies).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What WAF brings:&lt;/STRONG&gt; Adds edge protection against common web attacks (for example OWASP Top 10 patterns), reduces attack surface before traffic reaches the Hub, and centralizes L7 policy enforcement for all apps onboarded to Front Door.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Security note:&lt;/STRONG&gt; Apply WAF policy at the edge (managed + custom rules) to block malicious requests early; origin access control is enforced at the Azure Firewall layer (see Section 1.3).&lt;/P&gt;
&lt;H3&gt;1.3 Azure Firewall Premium (Hub security boundary)&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Role:&lt;/STRONG&gt; Security boundary in the Hub that exposes a controlled public ingress point (Firewall Public IP) for Azure Front Door origins, then performs &lt;STRONG&gt;DNAT&lt;/STRONG&gt; to the private Application Gateway in the Spoke.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Why Premium:&lt;/STRONG&gt; Use &lt;STRONG&gt;Firewall Premium&lt;/STRONG&gt; when you need advanced threat protection beyond basic L3/L4 controls, while keeping the origin private.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IDPS (intrusion detection and prevention):&lt;/STRONG&gt; Premium can add signature-based detection and prevention to help identify and block known threats as traffic traverses the firewall.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;TLS inspection (optional):&lt;/STRONG&gt; Premium supports TLS inspection patterns so you can apply threat detection to encrypted flows when your compliance and certificate management model allows it.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Premium feature note (DNAT scenarios):&lt;/STRONG&gt; These security features still apply when Azure Firewall is used for DNAT (public IP) scenarios. &lt;STRONG&gt;IDPS&lt;/STRONG&gt; operates in all traffic directions; however, Azure Firewall does not perform &lt;STRONG&gt;TLS inspection&lt;/STRONG&gt; on inbound internet traffic, so the effectiveness of IDPS for inbound encrypted flows is inherently limited. That said, &lt;STRONG&gt;Threat Intelligence&lt;/STRONG&gt; enforcement still applies, so protection against known malicious IPs and domains remains in effect.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hardening guidance:&lt;/STRONG&gt; Enforce origin lockdown here by restricting the DNAT listener to AzureFrontDoor.Backend (typically via an IP Group) so only Front Door can reach the firewall public IP; use Front Door WAF as the complementary L7 control plane at the edge.&lt;/P&gt;
&lt;H2&gt;2. Build Steps (Command Runbook)&lt;/H2&gt;
&lt;H3&gt;2.1 Set variables&lt;/H3&gt;
&lt;P&gt;$HUB_RG="HUB-VNET-Rgp"&lt;BR /&gt;$AKS_RG="AKS-VNET-RGp"&lt;BR /&gt;$LOCATION="eastus"&lt;BR /&gt;&lt;BR /&gt;$HUB_VNET="Hub-VNet"&lt;BR /&gt;$SPOKE_VNET="Spoke-AKS-VNet"&lt;BR /&gt;&lt;BR /&gt;$APPGW_NAME="spoke-appgw"&lt;BR /&gt;$APPGW_PRIVATE_IP="10.238.0.10"&lt;/P&gt;
&lt;P&gt;Note: The commands below are formatted for &lt;STRONG&gt;PowerShell&lt;/STRONG&gt;. When capturing output from an az command, use $VAR = (az ...).&lt;/P&gt;
&lt;H3&gt;2.2 Create resource groups&lt;/H3&gt;
&lt;P&gt;az group create --name $HUB_RG --location $LOCATION&lt;BR /&gt;az group create --name $AKS_RG --location $LOCATION&lt;/P&gt;
&lt;H3&gt;2.3 Create Hub VNet + AzureFirewallSubnet + Bastion subnet + VM subnet&lt;/H3&gt;
&lt;P&gt;# Create Hub VNet with AzureFirewallSubnet&lt;BR /&gt;az network vnet create -g $HUB_RG -n $HUB_VNET -l $LOCATION --address-prefixes 10.0.0.0/16 --subnet-name AzureFirewallSubnet --subnet-prefixes 10.0.1.0/24&lt;BR /&gt;&lt;BR /&gt;# Create Azure Bastion subnet (optional)&lt;BR /&gt;az network vnet subnet create -g $HUB_RG --vnet-name $HUB_VNET -n "AzureBastionSubnet" --address-prefixes "10.0.2.0/26"&lt;BR /&gt;&lt;BR /&gt;# Deploy Bastion (optional; requires AzureBastionSubnet)&lt;BR /&gt;az network public-ip create -g $HUB_RG -n "bastion-pip" --sku Standard --allocation-method Static&lt;BR /&gt;az network bastion create -g $HUB_RG -n "hub-bastion" --vnet-name $HUB_VNET --public-ip-address "bastion-pip" -l $LOCATION&lt;BR /&gt;&lt;BR /&gt;# Create test VM subnet for validation&lt;BR /&gt;az network vnet subnet create -g $HUB_RG --vnet-name $HUB_VNET -n "testvm-subnet" --address-prefixes "10.0.3.0/24"&lt;BR /&gt;&lt;BR /&gt;# Create a Windows test VM in the Hub (no public IP)&lt;BR /&gt;$VM_NAME = "win-testvm-hub"&lt;BR /&gt;$ADMIN_USER = "adminuser"&lt;BR /&gt;$ADMIN_PASS = ""&lt;BR /&gt;$NIC_NAME = "win-testvm-nic"&lt;BR /&gt;&lt;BR /&gt;az network nic create --resource-group $HUB_RG --location $LOCATION --name $NIC_NAME --vnet-name $HUB_VNET --subnet "testvm-subnet"&lt;BR /&gt;az vm create --resource-group $HUB_RG --name $VM_NAME --location $LOCATION --nics $NIC_NAME --image MicrosoftWindowsServer:WindowsServer:2022-datacenter-azure-edition:latest --admin-username $ADMIN_USER --admin-password $ADMIN_PASS --size Standard_D2s_v5&lt;/P&gt;
&lt;H3&gt;2.4 Create Spoke VNet + AKS subnet + App Gateway subnet&lt;/H3&gt;
&lt;P&gt;# Create Spoke VNet&lt;BR /&gt;az network vnet create -g $AKS_RG -n $SPOKE_VNET -l $LOCATION --address-prefixes 10.224.0.0/12&lt;BR /&gt;&lt;BR /&gt;# Create AKS subnet&lt;BR /&gt;az network vnet subnet create -g $AKS_RG --vnet-name $SPOKE_VNET -n aks-subnet --address-prefixes 10.224.0.0/16&lt;BR /&gt;&lt;BR /&gt;# Create Application Gateway subnet&lt;BR /&gt;az network vnet subnet create -g $AKS_RG --vnet-name $SPOKE_VNET -n appgw-subnet --address-prefixes 10.238.0.0/24&lt;/P&gt;
&lt;H3&gt;2.5 Validate and delegate the App Gateway subnet (required)&lt;/H3&gt;
&lt;P&gt;# Validate subnet exists&lt;BR /&gt;az network vnet subnet show -g $AKS_RG --vnet-name $SPOKE_VNET -n appgw-subnet&lt;BR /&gt;az network vnet subnet show -g $AKS_RG --vnet-name $SPOKE_VNET -n appgw-subnet --query addressPrefix -o tsv&lt;BR /&gt;&lt;BR /&gt;# Delegate subnet for Application Gateway (required)&lt;BR /&gt;az network vnet subnet update -g $AKS_RG --vnet-name $SPOKE_VNET -n appgw-subnet --delegations Microsoft.Network/applicationGateways&lt;/P&gt;
&lt;H3&gt;2.6 Create the private Application Gateway&lt;/H3&gt;
&lt;P&gt;az network application-gateway create -g $AKS_RG -n $APPGW_NAME --sku Standard_v2 --capacity 2 --vnet-name $SPOKE_VNET --subnet appgw-subnet --frontend-port 80 --http-settings-protocol Http --http-settings-port 80 --routing-rule-type Basic --priority 100 --private-ip-address $APPGW_PRIVATE_IP&lt;/P&gt;
&lt;H3&gt;2.7 Create AKS (public, Azure CNI overlay)&lt;/H3&gt;
&lt;P&gt;$AKS_SUBNET_ID = (az network vnet subnet show -g $AKS_RG --vnet-name $SPOKE_VNET -n aks-subnet --query id -o tsv)&lt;BR /&gt;$AKS_NAME = "aks-public-overlay"&lt;BR /&gt;&lt;BR /&gt;az aks create -g $AKS_RG -n $AKS_NAME -l $LOCATION --enable-managed-identity --network-plugin azure --network-plugin-mode overlay --vnet-subnet-id $AKS_SUBNET_ID --node-count 2 --node-vm-size Standard_DS3_v2 --dns-name-prefix aks-overlay --generate-ssh-keys&lt;/P&gt;
&lt;H3&gt;2.8 Enable AGIC and attach the existing Application Gateway&lt;/H3&gt;
&lt;P&gt;$APPGW_ID = (az network application-gateway show -g $AKS_RG -n $APPGW_NAME --query id -o tsv)&lt;BR /&gt;az aks enable-addons -g $AKS_RG -n $AKS_NAME --addons ingress-appgw --appgw-id $APPGW_ID&lt;/P&gt;
&lt;H3&gt;2.9 Connect to the cluster and validate AGIC&lt;/H3&gt;
&lt;P&gt;az aks get-credentials -g $AKS_RG -n $AKS_NAME --overwrite-existing&lt;BR /&gt;kubectl get nodes&lt;BR /&gt;&lt;BR /&gt;# Validate AGIC is running&lt;BR /&gt;kubectl get pods -n kube-system | findstr ingress&lt;BR /&gt;&lt;BR /&gt;# Inspect AGIC logs (optional)&lt;BR /&gt;$AGIC_POD = (kubectl get pod -n kube-system -l app=ingress-appgw -o jsonpath="{.items[0].metadata.name}")&lt;BR /&gt;kubectl logs -n kube-system $AGIC_POD&lt;/P&gt;
&lt;H3&gt;2.10 Create and link Private DNS zone (Hub) and add an A record&lt;/H3&gt;
&lt;P&gt;Create a Private DNS zone in the Hub, link it to both VNets, then create an A record for app1 pointing to the private Application Gateway IP.&lt;/P&gt;
&lt;P&gt;$PRIVATE_ZONE = "clusterksk.com"&lt;BR /&gt;&lt;BR /&gt;az network private-dns zone create -g $HUB_RG -n $PRIVATE_ZONE&lt;BR /&gt;&lt;BR /&gt;$HUB_VNET_ID = (az network vnet show -g $HUB_RG -n $HUB_VNET --query id -o tsv)&lt;BR /&gt;$SPOKE_VNET_ID = (az network vnet show -g $AKS_RG -n $SPOKE_VNET --query id -o tsv)&lt;BR /&gt;&lt;BR /&gt;az network private-dns link vnet create -g $HUB_RG -n "link-hub-vnet" -z $PRIVATE_ZONE -v $HUB_VNET_ID -e false&lt;BR /&gt;az network private-dns link vnet create -g $HUB_RG -n "link-spoke-aks-vnet" -z $PRIVATE_ZONE -v $SPOKE_VNET_ID -e false&lt;BR /&gt;&lt;BR /&gt;az network private-dns record-set a create -g $HUB_RG -z $PRIVATE_ZONE -n "app1" --ttl 30&lt;BR /&gt;az network private-dns record-set a add-record -g $HUB_RG -z $PRIVATE_ZONE -n "app1" -a $APPGW_PRIVATE_IP&lt;/P&gt;
&lt;H3&gt;2.11 Create VNet peering (Hub ­ Spoke)&lt;/H3&gt;
&lt;P&gt;az network vnet peering create -g $HUB_RG --vnet-name $HUB_VNET -n "HubToSpoke" --remote-vnet $SPOKE_VNET_ID --allow-vnet-access --allow-forwarded-traffic&lt;BR /&gt;az network vnet peering create -g $AKS_RG --vnet-name $SPOKE_VNET -n "SpokeToHub" --remote-vnet $HUB_VNET_ID --allow-vnet-access --allow-forwarded-traffic&lt;/P&gt;
&lt;H3&gt;2.12 Deploy sample app + Ingress and validate App Gateway programming&lt;/H3&gt;
&lt;P&gt;# Create namespace&lt;BR /&gt;kubectl create namespace demo&lt;BR /&gt;&lt;BR /&gt;# Create Deployment + Service (PowerShell)&lt;/P&gt;
&lt;P&gt;@' apiVersion: apps/v1 kind: Deployment metadata: name: app1 namespace: demo spec: replicas: 2 selector: matchLabels: app: app1 template: metadata: labels: app: app1 spec: containers: - name: app1 image: hashicorp/http-echo:1.0 args: - "-text=Hello from app1 via AGIC" ports: - containerPort: 5678 --- apiVersion: v1 kind: Service metadata: name: app1-svc namespace: demo spec: selector: app: app1 ports: - port: 80 targetPort: 5678 type: ClusterIP '@ | Set-Content .\app1.yaml&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;kubectl apply -f .\app1.yaml&lt;BR /&gt;&lt;BR /&gt;# Create Ingress (PowerShell)&lt;BR /&gt;@' apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: app1-ing namespace: demo annotations: kubernetes.io/ingress.class: azure/application-gateway appgw.ingress.kubernetes.io/use-private-ip: "true" spec: rules: - host: app1.clusterksk.com http: paths: - path: / pathType: Prefix backend: service: name: app1-svc port: number: 80 '@ | Set-Content .\app1-ingress.yaml&lt;BR /&gt;&lt;BR /&gt;kubectl apply -f .\app1-ingress.yaml&lt;/P&gt;
&lt;P&gt;# Validate Kubernetes objects&lt;BR /&gt;kubectl -n demo get deploy,svc,ingress&lt;BR /&gt;kubectl -n demo describe ingress app1-ing&lt;BR /&gt;&lt;BR /&gt;# Validate App Gateway has been programmed by AGIC&lt;BR /&gt;az network application-gateway show -g $AKS_RG -n $APPGW_NAME --query "{frontendIPConfigs:frontendIPConfigurations[].name,listeners:httpListeners[].name,rules:requestRoutingRules[].name,backendPools:backendAddressPools[].name}" -o json&lt;BR /&gt;&lt;BR /&gt;# If rules/listeners are missing, re-check AGIC logs from step 2.9&lt;BR /&gt;kubectl logs -n kube-system $AGIC_POD&lt;/P&gt;
&lt;H3&gt;2.13 Deploy Azure Firewall Premium + policy + public IP&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Firewall deployment (run after sample Ingress is created)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;$FWPOL_NAME = "hub-azfw-pol-test"&lt;BR /&gt;$FW_NAME = "hub-azfw-test"&lt;BR /&gt;$FW_PIP_NAME = "hub-azfw-pip"&lt;BR /&gt;$FW_IPCONF_NAME = "azfw-ipconf"&lt;BR /&gt;&lt;BR /&gt;# Create Firewall Policy (Premium)&lt;BR /&gt;az network firewall policy create -g $HUB_RG -n $FWPOL_NAME -l $LOCATION --sku Premium&lt;BR /&gt;&lt;BR /&gt;# Create Firewall public IP (Standard)&lt;BR /&gt;az network public-ip create -g $HUB_RG -n $FW_PIP_NAME -l $LOCATION --sku Standard --allocation-method Static&lt;BR /&gt;&lt;BR /&gt;# Deploy Azure Firewall in Hub VNet and associate policy + public IP&lt;BR /&gt;az network firewall create -g $HUB_RG -n $FW_NAME -l $LOCATION --sku AZFW_VNet --tier Premium --vnet-name $HUB_VNET --conf-name $FW_IPCONF_NAME --public-ip $FW_PIP_NAME --firewall-policy $FWPOL_NAME&lt;BR /&gt;&lt;BR /&gt;$FW_PUBLIC_IP = (az network public-ip show -g $HUB_RG -n $FW_PIP_NAME --query ipAddress -o tsv)&lt;BR /&gt;$FW_PUBLIC_IP&lt;/P&gt;
&lt;H3&gt;2.14 (Optional) Validate from Hub test VM&lt;/H3&gt;
&lt;P&gt;Optional: From the Hub Windows test VM (created in step 2.3), confirm app1.clusterksk.com resolves privately and the app responds through the private Application Gateway.&lt;/P&gt;
&lt;P&gt;# DNS should resolve to the private App Gateway IP&lt;BR /&gt;nslookup app1.clusterksk.com&lt;BR /&gt;&lt;BR /&gt;# HTTP request should return the sample response (for example: "Hello from app1 via AGIC")&lt;BR /&gt;curl http://app1.clusterksk.com&lt;BR /&gt;&lt;BR /&gt;# Browser validation (from the VM)&lt;BR /&gt;# Open: http://app1.clusterksk.com&lt;/P&gt;
&lt;H3&gt;2.15 Restrict DNAT to Azure Front Door (IP Group + DNAT rule)&lt;/H3&gt;
&lt;P&gt;$IPG_NAME = "ipg-afd-backend"&lt;BR /&gt;$RCG_NAME = "rcg-dnat"&lt;BR /&gt;$NATCOLL_NAME = "dnat-afd-to-appgw"&lt;BR /&gt;$NATRULE_NAME = "afd80-to-appgw80"&lt;BR /&gt;&lt;BR /&gt;# 1) Get AzureFrontDoor.Backend IPv4 prefixes and create an IP Group&lt;BR /&gt;$AFD_BACKEND_IPV4 = (az network list-service-tags --location $LOCATION --query "values[?name=='AzureFrontDoor.Backend'].properties.addressPrefixes[] | [?contains(@, '.')]" -o tsv)&lt;BR /&gt;az network ip-group create -g $HUB_RG -n $IPG_NAME -l $LOCATION --ip-addresses $AFD_BACKEND_IPV4&lt;BR /&gt;&lt;BR /&gt;# 2) Create a rule collection group for DNAT&lt;BR /&gt;az network firewall policy rule-collection-group create -g $HUB_RG --policy-name $FWPOL_NAME -n $RCG_NAME --priority 100&lt;BR /&gt;&lt;BR /&gt;# 3) Add NAT collection + DNAT rule (source = AFD IP Group, destination = Firewall public IP, 80 → 80)&lt;BR /&gt;az network firewall policy rule-collection-group collection add-nat-collection -g $HUB_RG --policy-name $FWPOL_NAME --rule-collection-group-name $RCG_NAME --name $NATCOLL_NAME --collection-priority 1000 --action DNAT --rule-name $NATRULE_NAME --ip-protocols TCP --source-ip-groups $IPG_NAME --destination-addresses $FW_PUBLIC_IP --destination-ports 80 --translated-address $APPGW_PRIVATE_IP --translated-port 80&lt;/P&gt;
&lt;H2&gt;3. Azure Front Door Configuration&lt;/H2&gt;
&lt;P&gt;In this section, we configure &lt;STRONG&gt;Azure Front Door Premium&lt;/STRONG&gt; as the public frontend with &lt;STRONG&gt;WAF&lt;/STRONG&gt;, create an endpoint, and route requests over &lt;STRONG&gt;HTTP (port 80)&lt;/STRONG&gt; to the &lt;STRONG&gt;Azure Firewall public IP&lt;/STRONG&gt; origin while preserving the host header (app1.clusterksk.com) for AGIC-based Ingress routing.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Create Front Door profile:&lt;/STRONG&gt; Create an &lt;STRONG&gt;Azure Front Door&lt;/STRONG&gt; profile and choose &lt;STRONG&gt;Premium&lt;/STRONG&gt;. Premium enables enterprise-grade edge features (including WAF and richer traffic/security controls) that you’ll use in this lab.&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Attach WAF:&lt;/STRONG&gt; Enable/associate a &lt;STRONG&gt;WAF policy&lt;/STRONG&gt; so requests are inspected at the edge (managed rules + any custom rules) before they’re allowed to reach the Azure Firewall origin.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Create an endpoint:&lt;/STRONG&gt; Add an endpoint name to create the public Front Door hostname (&amp;lt;endpoint&amp;gt;.azurefd.net) that clients will browse to in this lab.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Create an origin group:&lt;/STRONG&gt; Create an origin group to define how Front Door health-probes and load-balances traffic to one or more origins (for this lab, it will contain a single origin: the Firewall public IP).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Add an origin:&lt;/STRONG&gt; Add the Azure Firewall as the origin so Front Door forwards requests to the Hub entry point (Firewall Public IP), which then DNATs to the private Application Gateway.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Origin type&lt;/STRONG&gt;: &lt;STRONG&gt;Public IP address&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Public IP address&lt;/STRONG&gt;: select the &lt;STRONG&gt;Azure Firewall public IP&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Origin protocol/port&lt;/STRONG&gt;: &lt;STRONG&gt;HTTP&lt;/STRONG&gt;, &lt;STRONG&gt;80&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Host header&lt;/STRONG&gt;: app1.clusterksk.com&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Create a route:&lt;/STRONG&gt; Create a route to connect the endpoint to the origin group and define the HTTP behaviors (patterns, accepted protocols, and forwarding protocol) used for this lab.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Patterns to match&lt;/STRONG&gt;: /*&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Accepted protocols&lt;/STRONG&gt;: &lt;STRONG&gt;HTTP&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Forwarding protocol&lt;/STRONG&gt;: &lt;STRONG&gt;HTTP only&lt;/STRONG&gt; (this lab is HTTP-only)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Then you need to add the Route&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Review + create, then wait for propagation:&lt;/STRONG&gt; Select &lt;STRONG&gt;Review + create&lt;/STRONG&gt; (or &lt;STRONG&gt;Create&lt;/STRONG&gt;) to deploy the Front Door configuration, wait ~30–40 minutes for global propagation, then browse to http://&amp;lt;endpoint&amp;gt;.azurefd.net/.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;4. Validation (Done Criteria)&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;app1.clusterksk.com resolves to 10.238.0.10 from within the Hub/Spoke VNets (Private DNS link working).&lt;/LI&gt;
&lt;LI&gt;Azure Front Door can reach the origin over &lt;STRONG&gt;HTTP&lt;/STRONG&gt; and returns a 200/expected response (origin health is healthy).&lt;/LI&gt;
&lt;LI&gt;Requests to http://app1.clusterksk.com/ (internal) and http://&amp;lt;your-front-door-domain&amp;gt;/ (external) are routed to app1-svc and return the expected http-echo text (Ingress + AGIC wiring correct).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Author: Kumar shashi kaushal (Sr Digital cloud solutions architect Microsoft)&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 19:15:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-architecture-blog/secure-http-only-aks-ingress-with-azure-front-door-premium/ba-p/4508167</guid>
      <dc:creator>kkaushal</dc:creator>
      <dc:date>2026-04-03T19:15:55Z</dc:date>
    </item>
  </channel>
</rss>

