Generally Available: Serverless workspaces in Azure Databricks
Generally Available: Serverless workspaces in Azure Databricks
Serverless workspaces in Azure Databricks are now generally available, offering a fully managed workspace type that comes preconfigured with serverless compute and default storage. They deliver an enterprise-ready SaaS experience with zero infrastructure setup. With this release, customers can create Azure Databricks "Serverless" workspaces directly from the Azure portal to run production workloads in minutes, rapidly spin up short-lived environments for training and testing, and empower admins who lack direct cloud provisioning permissions to deploy and manage secure, governed Azure Databricks environments at scale, all natively available to every user in your Entra tenant.
Generally Available: Default Ruleset 2.2 in WAF for Azure Application Gateway
*Announcing the general availability of Default Rule Set (DRS) 2.2 for Web Application Firewall on Azure Application Gateway.
The Azure-managed DRS provides active protection against common web vulnerabilities and exploits. It also includes Microsoft Threat Intelligence collection rules, authored in collaboration with our intelligence teams, to deliver broader coverage, targeted vulnerability mitigations, and continual improvements in false-positive reduction.
DRS 2.2 is based on OWASP Core Rule Set 3.3.4, bringing refinements to existing detections and new protections, including rules that detect content types declared outside the actual content-type header and enhanced remote code execution (RCE) detections. An additional eight Microsoft Threat Intelligence rules expand coverage across SQL injection, XSS, and application-security attack patterns.
To significantly reduce legitimate traffic being blocked, DRS 2.2 ships at Paranoia Level (PL) 1 by default. PL1 includes high-signal, lower-noise rules that rarely trigger false positives. PL2 rules are disabled by default because they are more aggressive and typically require fine-tuning. You can keep PL2 disabled or selectively enable individual PL2 rules where warranted.

