<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[ABRARIX]]></title><description><![CDATA[Practical guides, troubleshooting, and hands-on labs for Modern Workplace technologies, including Azure Virtual Desktop, Windows 365, and Intune.]]></description><link>https://www.abrarix.com</link><generator>RSS for Node</generator><lastBuildDate>Fri, 24 Apr 2026 23:33:45 GMT</lastBuildDate><atom:link href="https://www.abrarix.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Preparing for the End of Default Outbound Access in Azure]]></title><description><![CDATA[Microsoft has announced that after March 31, 2026, any newly created Virtual Network will not have implicit Default Outbound Access enabled. Microsoft now recommends managing outbound traffic explicitly.
What is Default Outbound Access?
Default Outbo...]]></description><link>https://www.abrarix.com/preparing-for-the-end-of-default-outbound-access-in-azure</link><guid isPermaLink="true">https://www.abrarix.com/preparing-for-the-end-of-default-outbound-access-in-azure</guid><category><![CDATA[Azure]]></category><category><![CDATA[Azure Virtual Desktop]]></category><category><![CDATA[windows 365 cloud pc]]></category><category><![CDATA[windows 365]]></category><dc:creator><![CDATA[Abrar Chouhan]]></dc:creator><pubDate>Tue, 17 Feb 2026 03:52:20 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1771294894607/f9ad1f74-a205-4f40-86fd-51cf73e2eae8.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Microsoft has announced that after March 31, 2026, any newly created Virtual Network will not have implicit Default Outbound Access enabled. Microsoft now recommends managing outbound traffic explicitly.</p>
<h2 id="heading-what-is-default-outbound-access">What is Default Outbound Access?</h2>
<p>Default Outbound Access is essentially a fallback mechanism. If a subnet did not have any explicit outbound configuration such as:</p>
<ul>
<li><p>Instance level Public IP</p>
</li>
<li><p>NAT Gateway</p>
</li>
<li><p>NVA/Firewall</p>
</li>
<li><p>Load Balancer outbound rules</p>
</li>
</ul>
<p>Azure would automatically perform Source Network Address Translation using a Microsoft managed public IP address to allow outbound internet connectivity.</p>
<p>This public IP was platform managed, not visible as a resource in the Azure Portal, and not directly associated with the virtual machine or its network interface.</p>
<h2 id="heading-what-is-changing">What Is Changing?</h2>
<p>With the upcoming API update, the <strong>defaultOutboundAccess</strong> property for subnets will be set to false by default.</p>
<p>This means:</p>
<ul>
<li><p>Newly created subnets will automatically be private</p>
</li>
<li><p>No default public IP will be assigned</p>
</li>
<li><p>Outbound access must be configured intentionally</p>
</li>
</ul>
<p>The changes aims for:</p>
<ul>
<li><p>Improve overall network security posture</p>
</li>
<li><p>Reduce unintended internet exposure</p>
</li>
<li><p>Align with zero trust principles</p>
</li>
<li><p>Prevent disruption caused by non customer owned IP changes</p>
</li>
</ul>
<h2 id="heading-impact-on-existing-virtual-networks">Impact on Existing Virtual Networks</h2>
<p>There is no immediate impact on existing Virtual Networks or subnets.</p>
<p>They will continue to function as they do today.</p>
<p>The update only applies to newly created Virtual Networks and subnets after March 31, 2026.</p>
<p>That said, it is advisable for organizations to start planning explicit outbound management even for existing environments.</p>
<h2 id="heading-applicability-to-windows-365">Applicability to Windows 365</h2>
<p>In Windows 365, networking depends on how the environment is configured.</p>
<h3 id="heading-microsoft-hosted-network">Microsoft Hosted Network</h3>
<p>In this model, Cloud PCs are provisioned in a Microsoft managed network.</p>
<p>Customers do not manage the backend Virtual Network. There is no impact from this announcement and no action is required.</p>
<h3 id="heading-azure-network-connection">Azure Network Connection</h3>
<p>If Windows 365 is configured using Azure Network Connection, the behavior depends on the subnet.</p>
<p>Existing subnets will continue to work without issue.</p>
<p>However, for any new subnet created in the future, outbound connectivity must be configured explicitly.</p>
<p>If internet routing is not defined properly:</p>
<ul>
<li><p>Azure Network Connection validation checks will fail</p>
</li>
<li><p>Cloud PC provisioning will fail</p>
</li>
</ul>
<p>Some services such as Windows Activation require direct internet connectivity, so proper outbound routing becomes critical.</p>
<h2 id="heading-impact-on-azure-virtual-desktop">Impact on Azure Virtual Desktop</h2>
<p>For existing Azure Virtual Desktop environments, there is no immediate impact. Customers can continue adding virtual machines to existing host pools.</p>
<p>However, when creating new Virtual Networks or new subnets for expansion, outbound traffic must be explicitly managed.</p>
<p>Even though existing networks are unaffected, it is a good practice to proactively disable Default Outbound Access and implement controlled outbound architecture.</p>
<h2 id="heading-how-to-disable-default-outbound-access">How to Disable Default Outbound Access</h2>
<p>Default Outbound Access is configured at the subnet level.</p>
<p>To disable it for an existing subnet:</p>
<ol>
<li><p>Navigate to the Virtual Network</p>
</li>
<li><p>Select the desired subnet</p>
</li>
<li><p>Click the checkbox to Enable the Private Subnet.</p>
<p> <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1771298017777/f7e1bba7-44d4-496c-ab8b-9784d737a373.png" alt class="image--center mx-auto" /></p>
</li>
<li><p>Save the configuration</p>
</li>
</ol>
<p><code>Default Outbound Access should be disabled only when a controlled and explicitly designed egress path is already in place to avoid unintended loss of internet connectivity.</code></p>
<h1 id="heading-managing-outbound-traffic-explicitly">Managing Outbound Traffic Explicitly</h1>
<h2 id="heading-azure-nat-gateway">Azure NAT Gateway</h2>
<p>Azure NAT Gateway is Microsoft’s recommended solution for most outbound connectivity scenarios.</p>
<p>It enables secure and scalable outbound internet access while keeping virtual machines private and unreachable from inbound internet traffic.</p>
<h3 id="heading-benefits">Benefits</h3>
<ul>
<li><p>Predictable static Public IP or Public IP Prefix</p>
</li>
<li><p>No inbound exposure</p>
</li>
<li><p>Fully managed and highly available</p>
</li>
<li><p>Simple subnet level association</p>
</li>
</ul>
<h3 id="heading-how-it-works">How It Works</h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1771299201705/868aa557-ed8b-4638-ac75-cfd934c1a626.png" alt class="image--center mx-auto" /></p>
<p>In the depicted Topology:</p>
<p><strong>DOA-VNET</strong> represents the Virtual Network<br /><strong>default</strong> represents the private subnet<br /><strong>NATgateway</strong> represents the NAT Gateway<br /><strong>PIP</strong> represents the Public IP Prefix</p>
<p>When VM sends a request to the internet, the subnet routes the traffic to the associated NAT Gateway.</p>
<p>The NAT Gateway translates the private IP address of the VM into a public IP address from the Public IP Prefix and sends the request to the destination.</p>
<p>When the response returns, the NAT Gateway validates the session using its state table and maps the response back to the original private IP address of the VM.</p>
<p>The VM remains private throughout the process while still having secure outbound connectivity.</p>
<h2 id="heading-azure-firewall">Azure Firewall</h2>
<p>Azure Firewall is a cloud native security service deployed inside a Virtual Network.</p>
<p>It sits between your Azure environment and the internet or on premises network to centrally inspect and control traffic.</p>
<p>It is suitable when you require:</p>
<ul>
<li><p>Layer 3 to Layer 7 filtering</p>
</li>
<li><p>FQDN based rules</p>
</li>
<li><p>Threat intelligence protection</p>
</li>
<li><p>TLS inspection in Premium SKU</p>
</li>
<li><p>Intrusion Detection and Prevention</p>
</li>
</ul>
<p>Azure Firewall is available in Basic, Standard, and Premium SKUs.</p>
<h3 id="heading-considerations">Considerations</h3>
<ul>
<li><p>Higher cost compared to NAT Gateway</p>
</li>
<li><p>Possible additional latency due to inspection</p>
</li>
<li><p>Requires proper routing configuration</p>
</li>
</ul>
<h2 id="heading-other-outbound-connectivity-options">Other Outbound Connectivity Options</h2>
<p>Azure Load Balancer can provide outbound connectivity using outbound rules. In some cases, instance level Public IP addresses may also be used for direct outbound access.</p>
<p>However, each option should be evaluated carefully based on security, scalability, and operational requirements.</p>
<h2 id="heading-conclusion">Conclusion</h2>
<p>The upcoming change to Default Outbound Access reflects Microsoft’s continued focus on strengthening secure and intentional network design in Azure.</p>
<p>For many organizations, this update may have little to no impact, as explicit outbound connectivity using NAT Gateway, Azure Firewall, or other controlled methods is already a common best practice.</p>
<p>However, it remains a good opportunity to review existing environments, confirm there is no reliance on implicit outbound access, and ensure outbound traffic is aligned with security and governance standards.</p>
<p>Overall, this update reinforces structured network architecture without introducing disruption for well designed environments.</p>
]]></content:encoded></item><item><title><![CDATA[Windows 365 Licensing Models: Business, Enterprise, and Frontline]]></title><description><![CDATA[Microsoft Windows 365 provides multiple licensing options to address different workforce scenarios. The most commonly used models are Windows 365 Business, Windows 365 Enterprise, and Windows 365 Frontline.
Windows 365 Business and Enterprise
Windows...]]></description><link>https://www.abrarix.com/windows-365-licensing-models-business-enterprise-and-frontline</link><guid isPermaLink="true">https://www.abrarix.com/windows-365-licensing-models-business-enterprise-and-frontline</guid><category><![CDATA[Windows 365 Licensing Model]]></category><category><![CDATA[Windows 365 Business]]></category><category><![CDATA[Windows 365 Enterprise]]></category><category><![CDATA[Windows 365 Frontline]]></category><category><![CDATA[windows 365 cloud pc]]></category><category><![CDATA[Windows]]></category><category><![CDATA[windows365]]></category><category><![CDATA[windows 365]]></category><dc:creator><![CDATA[Abrar Chouhan]]></dc:creator><pubDate>Sat, 31 Jan 2026 17:57:15 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1770662316814/3463475f-49b4-4311-afe1-7e4c48d6d134.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Microsoft Windows 365 provides multiple licensing options to address different workforce scenarios. The most commonly used models are <strong>Windows 365 Business</strong>, <strong>Windows 365 Enterprise</strong>, and <strong>Windows 365 Frontline</strong>.</p>
<h2 id="heading-windows-365-business-and-enterprise">Windows 365 Business and Enterprise</h2>
<p>Windows 365 <strong>Business</strong> and <strong>Enterprise</strong> provide a <strong>dedicated Cloud PC per user</strong>, licensed on a <strong>per-user, per-month</strong> basis.</p>
<p>In these models:</p>
<ul>
<li><p>Each Cloud PC is permanently assigned to a single user</p>
</li>
<li><p>The desktop experience is <strong>persistent across sessions</strong></p>
</li>
<li><p>Users can securely access their Cloud PC from supported endpoints</p>
</li>
</ul>
<p>These models are best suited for scenarios where users require a <strong>full-time, persistent virtual desktop</strong>, similar to a physical laptop or workstation.</p>
<p>For an official and detailed comparison between <strong>Windows 365 Business</strong> and <strong>Windows 365 Enterprise</strong>, refer to Microsoft Learn: <a target="_blank" href="https://learn.microsoft.com/en-us/windows-365/business-enterprise-comparison">https://learn.microsoft.com/en-us/windows-365/business-enterprise-comparison</a></p>
<h2 id="heading-windows-365-frontline-overview">Windows 365 Frontline Overview</h2>
<p>Microsoft introduced <strong>Windows 365 Frontline</strong> to support organizations with <strong>shift-based or frontline workers</strong> where users do not require concurrent access.</p>
<p>Key characteristics of Windows 365 Frontline:</p>
<ul>
<li><p>Licenses are <strong>not permanently assigned to users</strong></p>
</li>
<li><p>A license is <strong>consumed only while a user session is active</strong></p>
</li>
<li><p>Licensing is based on <strong>concurrent usage</strong>, not total user count</p>
</li>
</ul>
<p>This model helps organizations optimize costs in environments where multiple users access Cloud PCs across different shifts.</p>
<h2 id="heading-example-scenario-247-it-service-desk">Example Scenario: 24/7 IT Service Desk</h2>
<p>Consider an IT Service Desk in a organization with the following setup:</p>
<ul>
<li><p>Total administrators: <strong>90</strong></p>
</li>
<li><p>Shifts: <strong>3</strong></p>
</li>
<li><p>Administrators per shift: <strong>30</strong></p>
</li>
<li><p>Maximum concurrent users: <strong>30</strong></p>
</li>
</ul>
<h3 id="heading-business-enterprise-licensing">Business / Enterprise Licensing</h3>
<p>Using Windows 365 Business or Enterprise:</p>
<ul>
<li><p>The organization would need <strong>90 licenses</strong></p>
</li>
<li><p>Each administrator receives a <strong>dedicated Cloud PC</strong></p>
</li>
<li><p>Licenses are required regardless of shift patterns or active usage</p>
</li>
</ul>
<h3 id="heading-frontline-licensing">Frontline Licensing</h3>
<p>Using Windows 365 Frontline:</p>
<ul>
<li><p>The organization needs only <strong>30 Frontline licenses</strong></p>
</li>
<li><p>Licenses are consumed only by <strong>active sessions</strong></p>
</li>
<li><p>All 90 administrators can share the same license pool across shifts</p>
</li>
</ul>
<h2 id="heading-windows-365-frontline-deployment-models">Windows 365 Frontline Deployment Models</h2>
<p>Windows 365 Frontline supports <strong>two deployment models</strong>: <strong>Dedicated</strong> and <strong>Shared</strong>.</p>
<h3 id="heading-frontline-dedicated-model">Frontline Dedicated Model</h3>
<ul>
<li><p>One Frontline license allows provisioning of <strong>up to three Cloud PCs</strong></p>
</li>
<li><p>Only <strong>one Frontline Cloud PC user session can be active per license at any given time</strong></p>
</li>
<li><p>Cloud PCs are <strong>assigned to individual users</strong></p>
</li>
<li><p>The desktop experience is <strong>persistent</strong>, similar to Business and Enterprise</p>
</li>
</ul>
<p>In this scenario:</p>
<ul>
<li><p><strong>30 Frontline licenses</strong> can provision <strong>up to 90 Cloud PCs</strong></p>
</li>
<li><p>A maximum of <strong>30 users</strong> can be signed in concurrently</p>
</li>
<li><p>Additional sign-ins are not possible until an active session ends and a license becomes available</p>
</li>
</ul>
<p>This model is suitable for shift-based users who still require a <strong>persistent desktop experience</strong>.</p>
<h3 id="heading-frontline-shared-model">Frontline Shared Model</h3>
<ul>
<li><p>Cloud PCs are provisioned as a <strong>shared pool</strong></p>
</li>
<li><p>Cloud PCs are <strong>not assigned to specific users</strong></p>
</li>
<li><p>Users are assigned via an <strong>Entra ID group</strong></p>
</li>
<li><p>At sign-in, users are connected to an available Cloud PC</p>
</li>
<li><p>At sign-out, the Cloud PC is signed out and returned to its original state</p>
</li>
</ul>
<p>This model behaves like a <strong>non-persistent virtual desktop environment</strong>:</p>
<ul>
<li><p>User-specific data and local changes are <strong>not retained by default</strong></p>
</li>
<li><p>Each session starts with a clean environment</p>
</li>
</ul>
<h2 id="heading-user-experience-sync">User Experience Sync</h2>
<p>Microsoft has introduced <strong>User Experience Sync</strong> to improve usability in <strong>Windows 365 Frontline Shared</strong> environments.</p>
<p>User Experience Sync:</p>
<ul>
<li><p>Preserves <strong>user settings and profile experience</strong></p>
</li>
<li><p>Does <strong>not</strong> provide full desktop persistence</p>
</li>
<li><p>Enhances user continuity without changing the non-persistent nature of shared Cloud PCs</p>
</li>
</ul>
<p>A detailed technical discussion on User Experience Sync can be covered in a separate article.</p>
<h2 id="heading-conclusion">Conclusion</h2>
<ul>
<li><p><strong>Windows 365 Business / Enterprise</strong><br />  Best suited for users who require a full-time, persistent Cloud PC without dependency on shift-based usage.</p>
</li>
<li><p><strong>Windows 365 Frontline Dedicated</strong><br />  Suitable for shift-based users who need a persistent desktop while optimizing licensing costs through concurrency.</p>
</li>
<li><p><strong>Windows 365 Frontline Shared</strong><br />  Appropriate when users require temporary access to applications or corporate resources and full user data persistence is not required.</p>
</li>
</ul>
<p><em>This article is based on publicly available Microsoft documentation and personal experience. It does not represent official Microsoft guidance.</em></p>
]]></content:encoded></item><item><title><![CDATA[Windows 365 vs Azure Virtual Desktop which one is right for  your business?]]></title><description><![CDATA[Introduction
Azure Virtual Desktop (AVD), previously known as Windows Virtual Desktop, is Microsoft’s platform for delivering virtualized desktops and applications. With AVD, organizations can publish individual applications using RemoteApp or provid...]]></description><link>https://www.abrarix.com/windows-365-vs-azure-virtual-desktop-which-one-is-right-for-your-business</link><guid isPermaLink="true">https://www.abrarix.com/windows-365-vs-azure-virtual-desktop-which-one-is-right-for-your-business</guid><category><![CDATA[AVD vs W365]]></category><category><![CDATA[windows365]]></category><category><![CDATA[windows 365 cloud pc]]></category><category><![CDATA[AVD]]></category><category><![CDATA[Azure Virtual Desktop]]></category><dc:creator><![CDATA[Abrar Chouhan]]></dc:creator><pubDate>Mon, 26 Jan 2026 20:05:02 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1770662470128/9f89bca3-8a52-451d-ba20-1c974d424ab5.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction">Introduction</h2>
<p>Azure Virtual Desktop (AVD), previously known as Windows Virtual Desktop, is Microsoft’s platform for delivering virtualized desktops and applications. With AVD, organizations can publish individual applications using <strong>RemoteApp</strong> or provide users with a complete <strong>virtual desktop experience</strong>.</p>
<p>Windows 365 takes a different approach. It is a <strong>SaaS-based desktop solution</strong> that integrates directly with <strong>Microsoft Intune</strong>. The goal of Windows 365 is to simplify virtual desktop delivery by reducing infrastructure design, operational overhead, and ongoing management effort for IT teams.</p>
<p>Both solutions address similar use cases but are built on very different models. Choosing between them depends on how much control, flexibility, and operational responsibility a business wants to take on.</p>
<h2 id="heading-azure-virtual-desktop-avd">Azure Virtual Desktop (AVD)</h2>
<p>Azure Virtual Desktop offers organizations full control over how their virtual desktop environment is designed and operated. Depending on business needs, AVD can be configured to deliver only specific applications or full desktops, using either <strong>persistent</strong> or <strong>non-persistent</strong> session hosts.</p>
<p>A key capability of AVD is support for <strong>Windows 10 and Windows 11 multi-session</strong>, which is available exclusively in Azure. Multi-session allows multiple users to connect to a single Windows client virtual machine, helping organizations reduce costs while maintaining a familiar end-user experience.</p>
<p>This capability is particularly useful for application virtualization scenarios, where multiple users need access to the same set of client-based applications.</p>
<h3 id="heading-advantages">Advantages</h3>
<ul>
<li><p>High level of control over infrastructure and configuration</p>
</li>
<li><p>Flexible design aligned with specific business requirements</p>
</li>
<li><p>Support for persistent and non-persistent desktops</p>
</li>
<li><p>Ability to leverage Windows 10/11 multi-session for better cost efficiency</p>
</li>
</ul>
<h3 id="heading-limitations">Limitations</h3>
<ul>
<li><p>Larger deployments can become complex to design and manage</p>
</li>
<li><p>Cost optimization depends heavily on correct scaling and capacity planning</p>
</li>
</ul>
<h2 id="heading-windows-365">Windows 365</h2>
<p>Windows 365 is a <strong>SaaS VDI solution</strong> where desktops referred to as <strong>Cloud PCs</strong> are provisioned and managed through Microsoft Intune. Unlike AVD, Windows 365 focuses on simplicity and consistency rather than infrastructure customization.</p>
<p>There are two main deployment approaches:</p>
<ol>
<li><p><strong>Microsoft-hosted configuration</strong></p>
<ul>
<li><p>Uses standard marketplace images</p>
</li>
<li><p>Networking and infrastructure are fully managed by Microsoft</p>
</li>
</ul>
</li>
<li><p><strong>Customer-managed networking configuration</strong></p>
<ul>
<li><p>Allows the use of custom images</p>
</li>
<li><p>Azure virtual networks and subnets are managed by the customer</p>
</li>
</ul>
</li>
</ol>
<p>In both cases, the Cloud PC itself runs on <strong>Azure infrastructure hosted within Microsoft-managed Azure subscriptions</strong>. As a result, administrators do not have direct access to the underlying virtual machines through the Azure portal. Instead, all management actions such as restart, reprovision, and monitoring are performed via the <strong>Intune admin center</strong>.</p>
<p>Cloud PCs are typically created by assigning a Windows 365 license to a user. Licensing follows a <strong>fixed, per-user monthly pricing model</strong>, making cost forecasting straightforward.</p>
<p>Microsoft continues to expand the Windows 365 ecosystem with features such as:</p>
<ul>
<li><p>Frontline editions for shift-based workers</p>
</li>
<li><p>Windows 365 Cloud Apps</p>
</li>
<li><p>Windows 365 Link devices designed for Cloud PC access</p>
</li>
</ul>
<p>These capabilities open up additional use cases that are worth exploring separately.</p>
<h3 id="heading-advantages-1">Advantages</h3>
<ul>
<li><p>Simplified deployment and administration</p>
</li>
<li><p>Rapid provisioning of Cloud PCs</p>
</li>
<li><p>Predictable and transparent pricing</p>
</li>
</ul>
<h3 id="heading-limitations-1">Limitations</h3>
<ul>
<li><p>Reduced flexibility compared to Azure Virtual Desktop</p>
</li>
<li><p>Limited visibility and control over the underlying infrastructure</p>
</li>
</ul>
<h2 id="heading-conclusion">Conclusion</h2>
<p>Azure Virtual Desktop and Windows 365 are both powerful solutions, but they are designed with different priorities in mind. AVD is best suited for organizations that require <strong>maximum flexibility and control</strong>, while Windows 365 is ideal for those looking for <strong>simplicity, speed, and predictable costs</strong>.</p>
<p>Understanding the customer’s requirements such as scalability, management overhead, and cost model is the key factor in selecting the right solution</p>
]]></content:encoded></item></channel></rss>