Skip to content

Commit 5f2bda7

Browse files
Merge pull request #9563 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-19 22:00 UTC
2 parents 9034143 + 10c2eba commit 5f2bda7

4 files changed

Lines changed: 158 additions & 0 deletions

File tree

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
name: Create Azure DevOps CI on PR
2+
3+
on:
4+
pull_request:
5+
types: [opened]
6+
7+
jobs:
8+
create-work-item:
9+
runs-on: ubuntu-latest
10+
steps:
11+
- name: Create Azure DevOps Task
12+
env:
13+
ADO_ORG_URL: https://dev.azure.com/KMOps
14+
ADO_PROJECT: ContentExperience
15+
ADO_PAT: ${{ secrets.ADO_PAT }}
16+
run: |
17+
PR_TITLE="${{ github.event.pull_request.title }}"
18+
PR_BODY="${{ github.event.pull_request.body }}"
19+
PR_URL="${{ github.event.pull_request.html_url }}"
20+
21+
curl -X POST \
22+
-H "Content-Type: application/json-patch+json" \
23+
-H "Authorization: Basic $(echo -n ":$ADO_PAT" | base64)" \
24+
$ADO_ORG_URL/$ADO_PROJECT/_apis/wit/workitems/$ExternalCI?api-version=6.0 \
25+
-d '[
26+
{
27+
"op": "add",
28+
"path": "/fields/System.Title",
29+
"value": "PR Opened: '"$PR_TITLE"'"
30+
},
31+
{
32+
"op": "add",
33+
"path": "/fields/System.Description",
34+
"value": "Pull Request URL: '"$PR_URL"'\n\n'"$PR_BODY"'"
35+
}
36+
]'
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Zonal enablement request for restricted vm series
3+
description: Guidance to request access to restricted vm series in selected zones.
4+
ms.date: 08/06/2025
5+
ms.service: azure-common-issues-support
6+
ms.author: zmazieva
7+
author: zmazieva78MS
8+
ms.reviewer: v-liuamson
9+
---
10+
# Zonal enablement request for restricted virtual machine series
11+
12+
Zonal enablement requests allow customers to select specific zones in a region when requesting access to restricted virtual machine series.
13+
14+
## Step 1: Create a support request
15+
16+
This guide explains how to request restricted virtual machine series in a specific zone using Help + Support path in the **Azure Portal**.
17+
18+
1. Log into the [Azure Portal](https://portal.azure.com) and navigate to **Help + support**, then select **Create a support request**.
19+
1. Type in **quotas** in the **Describe your issue** search bar.
20+
1. Select **Service and Subscription Limits (quotas)** click **Create a support request**
21+
1. In the **New support request** page, complete the following:
22+
1. In **Issue Type**, select **Service and Subscription Limits (quotas)**.
23+
1. In **Subscription**, select the relevant subscription for which you would like to request access.
24+
1. In **Quota type**, select **Compute-VM (cores-vCPUs) subscription limit increases** proceed next.
25+
26+
## Step 2: Provide problem details
27+
28+
1. In the **Problem details** section, select **Enter details**.
29+
1. Select **Resource Manager** in the **Deployment model**.
30+
1. Select **Zone access** in the **Choose request types**.
31+
1. In the **Request details** section select preferred regions in **Locations**
32+
1. In the displayed region boxes, select the appropriate zone from the **Select requested logical zone** dropdown list.
33+
1. Then select the VM series you would like to request.
34+
1. Select **Save and continue**.
35+
> [!Note]
36+
> Multiple regions and zones can be selected in one support request.
37+
38+
## Step 3: Review and Submit
39+
1. Review and fill in the details for the best way to contact you.
40+
1. Select **Create** to submit the request.
41+
42+
## Request processing
43+
44+
Once you create the support request, the ticket follows our standard process. The confirmation, including your support ticket number, will be sent to your registered email address. If the support team has other questions, they contact you using the communication method you specified in your request.
45+
46+
## Tracking request status
47+
48+
Status of the Quota request can be monitored through **Help + Support/Overview** or **Help + Support/All support requests** in Azure Portal.

support/windows-server/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2754,6 +2754,8 @@ items:
27542754
items:
27552755
- name: Antivirus exclusions for Hyper-V hosts
27562756
href: ./virtualization/antivirus-exclusions-for-hyper-v-hosts.md
2757+
- name: Block users from running Hyper-V and VMware virtual machines on workstation-class computers
2758+
href: ./virtualization/block-users-from-running-virtualization-features-on-specific-computers.md
27572759
- name: Issues when starting VM or installing Hyper-V
27582760
href: ./virtualization/bios-update-for-hyper-v.md
27592761
- name: Run programs on non-Microsoft hardware virtualization software
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
---
2+
title: How to Block Users from Running Hyper-V and VMware Virtual Machines on Workstation-class Computers
3+
description: Describes how to block users from installing Hyper-V or other virtualization software on specific computers.
4+
ms.date: 08/15/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika
9+
ms.custom:
10+
- sap:virtualization and hyper-v\installation and configuration of hyper-v
11+
- pcy:WinComm Storage High Avail
12+
---
13+
14+
# Block users from running Hyper-V and VMware VMs on workstation-class computers
15+
16+
This article provides guidance for how to use Windows PowerShell or Group Policy to block users from running virtualization software, such as Hyper-V and VMware, on workstation-class computers. These procedures apply to scenarios in which you want to prevent virtualization software from running on both domain-joined and non-domain-joined computers, regardless of a user's administrative permissions.
17+
18+
*Applies to:* Hyper-V Server 2019
19+
20+
## How to block virtualization services
21+
22+
> [!IMPORTANT]
23+
>
24+
> - Before you make these changes in a production environment, test them in a lab environment. This step helps make sure that the changes (especially Group Policy changes) produce the intended results and don't introduce operational issues.
25+
> - Make sure that you have Administrator permissions on the workstation computers.
26+
27+
### How to block the Hyper-V feature on a single computer
28+
29+
1. On the computer, open an administrative Windows PowerShell window.
30+
1. Run the following cmdlets, in sequence:
31+
32+
```powershell
33+
Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All
34+
bcdedit /set hypervisorlaunchtype off
35+
```
36+
37+
The first cmdlet removes Hyper-V from the set of available optional features. The second cmdlet prevents Hyper-V from running.
38+
39+
### How to use Group Policy to block Hyper-V services on multiple computers
40+
41+
To configure an appropriate policy, follow these steps:
42+
43+
1. In the Group Policy Management Console (GPMC), navigate to or create a Group Policy Object (GPO) that applies to the affected computers.
44+
1. Right-click the GPO, and then select **Edit**. In the Group Policy Editor, select **Computer Configuration** > **Windows Settings** > **Security Settings** > **System Services**.
45+
1. Configure each service that's related to Hyper-V (for example, Hyper-V Virtual Machine Management). For each of these services, follow these steps:
46+
1. Right-click the service, and then select **Properties**.
47+
1. In the **Properties** dialog box, select **Define this policy setting**, select **Disabled**, and then select **OK**.
48+
1. To propagate the policy change, restart all the target computers.
49+
50+
For more information about how to use Group Policy, see [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm/).
51+
52+
## How to use Group Policy to block VMware Workstation services
53+
54+
To configure an appropriate policy, follow these steps:
55+
56+
1. In the GPMC, navigate to or create a GPO that applies to the affected computers.
57+
1. Right-click the GPO, and then select **Edit**. In the Group Policy Editor, select **Computer Configuration** > **Policies** > **Windows Settings** > **Security Settings** > **System Services**.
58+
59+
To block users from running VMware Workstation, follow these steps:
60+
61+
1. Create a path rule in **Software Restriction Policies**:
62+
63+
1. Open the GPMC, and go to **Computer Configuration** > **Policies** > **Policies** > **Windows Settings** > **Software Restriction Policies**.
64+
1. If there aren't any software restriction policies, right-click **Software Restriction Policies**, and then select **New Software Restriction Policies**.
65+
1. Right-click **Additional Rules**, and then select **New path rule**.
66+
1. In the **Path** box, specify the path to the VMware executable files (for example, type *C:\\Program Files (x86)\\VMware\\*, or enter the path to specific .exe files).
67+
1. Select **Security level**, and then select **Disallowed**.
68+
1. Select **OK**.
69+
70+
1. To propagate the policy change, restart all the target computers.
71+
72+
For more information about how to use Group Policy, see [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm/).

0 commit comments

Comments
 (0)