Skip to content

Commit e71667b

Browse files
Merge pull request #18536 from MicrosoftDocs/main
Auto Publish – main to live - 2025-07-24 22:00 UTC
2 parents 1f26f7e + a215700 commit e71667b

File tree

3 files changed

+23
-7
lines changed

3 files changed

+23
-7
lines changed
36.2 KB
Loading

azure-local/migrate/migrate-whats-new.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,31 @@
11
---
2-
title: What's new for Azure Migrate to Azure Local
3-
description: Learn about new features for Azure Migrate on Azure Local.
2+
title: What's new in Azure Migrate for Azure Local
3+
description: Learn about new features in Azure Migrate for Azure Local.
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 07/02/2025
7+
ms.date: 07/24/2025
88
ms.service: azure-local
99
---
1010

11-
# What's new for Azure Migrate to Azure Local
11+
# What's new in Azure Migrate for Azure Local
1212

1313
This article lists the various features and improvements that are available in VM migration to Azure Local.
1414

15+
## June 2025
16+
17+
This release includes these features and improvements:
18+
19+
- **Improved cleanup for failed replications** – Fixed an issue where failed replication jobs left behind data on the target Azure Local instance. The leftover data is now properly removed when replication fails in such cases.
20+
- **Static IP address migration Windows script improvements** – Made several improvements to the Windows VM static IP migration script:
21+
- Updated the scheduled task execution policy to resolve permission issues.
22+
- Improved handling of file paths containing spaces.
23+
- Implemented automatic cleanup to retain only the three most recent log files.
24+
- **Improved error resolution guidance** – Enhanced error messaging and added detailed resolution steps for common issues, including replication failures.
25+
- **Stricter static IP validation** – Added error handling to prevent Network Interface Card (NIC) creation if the specified static IP is outside the defined pool range.
26+
- **Generation 1 VM Guest Management Enablement Message** – Added a warning message in the portal to ensure that generation 1 VMs are powered off prior to enabling guest management.
27+
28+
:::image type="content" source="./media/migrate-whats-new/guest-enablement-warning-message.png" alt-text="Screenshot showing the warning message in the portal when enabling guest management on generation 1 VMs." lightbox="./media/migrate-whats-new/guest-enablement-warning-message.png":::
1529

1630
## May 2025
1731

azure-local/security-update/security-update.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This security update includes quality improvements. Below is a summary of the ke
4141

4242
- **[Microsoft RPC Netlogon protocol]** Fixed: This update includes a security hardening change to the Microsoft RPC Netlogon protocol. This change improves security by tightening access checks for a set of remote procedure call (RPC) requests. After this update is installed, Active Directory domain controllers will no longer allow anonymous clients to invoke some RPC requests through the Netlogon RPC server. These requests are typically related to domain controller location. Certain file and print service software can be affected, including Samba. If your organization uses Samba, please refer to the [Samba release notes](https://www.samba.org/samba/history/samba-4.22.3.html).
4343

44-
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [July 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-July).
44+
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [July 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Jul).
4545

4646
## Known issues
4747

@@ -72,7 +72,7 @@ This security update includes quality improvements. Here is a summary of the key
7272

7373
- **[Windows Firewall]** Fixed: This update addresses an issue found in Event Viewer as Event 2042 for Windows Firewall with Advanced Security. The event appears as "Config Read Failed" with the message "More data is available." For more information about this issue, see "Error events are logged for Windows Firewall" in the Windows Health Dashboard.
7474

75-
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [July 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-July).
75+
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [July 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Jul).
7676

7777
## Known issues
7878

@@ -131,7 +131,7 @@ This security update includes quality improvements. Below is a summary of the ke
131131

132132
- **[Windows Hello]** Fixed: This update addresses an issue that prevents users from signing in with self-signed certificates when using Windows Hello for Business with the Key Trust model.​​​​​​​
133133

134-
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [June 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-June).
134+
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [June 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Jun).
135135

136136
## Known issues
137137

@@ -159,6 +159,8 @@ This security update includes quality improvements. Here is a summary of the key
159159

160160
- **[Windows Hello]** Fixed: This update addresses an issue that prevents users from signing in with self-signed certificates when using Windows Hello for Business with the Key Trust model.​​​​​​​
161161

162+
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [June 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Jun).
163+
162164
## Known issues
163165

164166
### Noto fonts

0 commit comments

Comments
 (0)