Azure Blob Storage Admin Guide (2026): Tiers, Lifecycle, Security

Azure Blob Storage in 2026 spans four access tiers (Hot, Cool, Cold, Archive) plus a lifecycle management engine that automates tier transitions across millions of objects. The July 2026 billing change introduces a 128 KiB minimum billable object size for Cool, Cold, and Archive tiers, reshaping the cost model for tenants storing many small objects.

Quick answer. Azure Blob Storage has 4 tiers in 2026: Hot (default, no min retention), Cool (30d min), Cold (90d min), Archive (180d min, 15h rehydrate). Use lifecycle policies to demote: Cool after 30d, Cold after 90d, Archive only for compliance retention. From July 2026, Cool/Cold/Archive bill at minimum 128 KiB per object on new accounts. Pack small files. Default-deny public access. Enable soft delete + versioning on production containers.

Free PDF guide

Microsoft 365 Tenant Audit Checklist for 2026

40+ checks including Azure Blob Storage tier distribution, lifecycle policy coverage, public-access posture, soft delete and versioning posture, Private Endpoints presence, and the customer-managed keys configuration on Key Vault for regulated workloads.

Download the checklist (PDF)

Furthermore, this Azure Blob Storage admin guide covers the four access tiers with their minimum retention periods, the lifecycle management JSON policy syntax, the early-deletion penalty mechanics, the immutability + soft delete + versioning protection layers, the encryption options, the network controls, and the Wintive baseline across 60+ Microsoft 365 + Azure SMB tenants. The most common gap: 64% of audited tenants run with no lifecycle policy, leaving everything in Hot tier regardless of access frequency.

📅 Azure Blob Storage in 2026 — what changed

Specifically, three forces reshaped Azure Blob Storage cost and security between 2024 and 2026. Each force changed the SMB design pattern. First, the 128 KiB minimum billable object size for Cool, Cold, and Archive tiers takes effect on new accounts on July 1, 2026, and rolls out to all accounts on July 1, 2027. Therefore, tenants storing many small objects face a structural cost increase. Examples include log lines, telemetry events, and IoT metadata. The mitigation is to pack small files before tiering. Second, the Cold tier matured as a first-class online tier between Cool and Archive, with 90-day minimum retention and milliseconds-latency reads, opening a new cost band for compliance-grade archives that still need quick access.

In addition, immutability policies hardened in 2026. Versioning, soft delete, and immutable blob storage form a three-layer protection stack against ransomware and accidental deletion. Critically, Wintive sees rising adoption of Private Endpoints replacing storage account public access, with 28% of audited tenants having migrated at least one storage account to private connectivity. The hourly OpEx model with no on-prem CapEx commitment keeps the per-GB TCO predictable across the lifecycle horizon.

🔐 Pick the right Azure Blob Storage tier

Specifically, the tier decision is the first design choice for any new Azure Blob Storage container in 2026. Therefore, the decision tree below answers the core question. How often will the data be read after upload? What is the minimum retention requirement before deletion?

Azure Blob Storage tier decision tree for 2026 covering the Hot tier as the default for daily and weekly access with no minimum retention the Cool tier with 30-day minimum retention for monthly access patterns the Cold tier with 90-day minimum retention for rarely accessed online compliance archives and the Archive tier with 180-day minimum retention for long-term offline storage requiring 15 hour rehydration plus the 2026 billing change with 128 KiB minimum billable object size for Cool Cold and Archive tiers
🔐 Azure Blob Storage tier decision tree — default to Hot, lifecycle-demote to Cool/Cold, Archive only for compliance.

Specifically, the decision tree above shows the four tiers. The next question for any Azure admin is the structural choice: which storage account type and which blob type fit the workload, and how do the four tiers compare across cost, retention, latency, and read patterns?

🏗 Storage account types and blob types

Specifically, Azure offers three storage account types relevant to Blob Storage in 2026. The General Purpose v2 account (StorageV2) is the SMB default. It supports all features. The full list includes four access tiers, lifecycle management, soft delete, versioning, immutability, and Private Endpoints. The Block Blob Storage Premium account targets high-transaction workloads with millisecond latency. This account does not support tiering to Cool, Cold, or Archive. Page Blob Premium hosts unmanaged disks for VMs and is rarely chosen directly today.

Three blob types: block, append, page

In practice, block blobs are the canonical type for files, images, documents, backups, and most application data. Therefore, block blobs are the only type that supports access tiers (Hot, Cool, Cold, Archive). Append blobs target log streams and append-only patterns. New data is added to the end of the blob without rewriting the existing content. Page blobs back unmanaged VHD disks for legacy IaaS scenarios. The type supports random read and write at the page level. Critically, only block blobs participate in lifecycle management for tier transitions.

Account / blob typeBest forTiers supportedLifecycle support
General Purpose v2 + block blobSMB default for files, backups, app dataHot, Cool, Cold, ArchiveYes
General Purpose v2 + append blobLog streams, audit trailsHot onlyDelete only
General Purpose v2 + page blobUnmanaged disk VHDsHot onlyDelete only
Premium Block BlobHigh-transaction sub-millisecond readsPremium onlyNo tiering
Data Lake Storage Gen2 (HNS)Analytics, big data with hierarchical namespaceHot, Cool, Cold, ArchiveYes

📋 Storage account and blob type matrix — pick General Purpose v2 plus block blobs for the SMB default.

Specifically, the matrix above shows the structural choice. The tier comparison matrix below shows how the four access tiers stack against each other across cost, retention, latency, and best-for use case. Therefore, this is the reference table to bookmark when designing lifecycle transitions for any Azure Blob Storage workload.

Azure Blob Storage tier comparison matrix for 2026 covering Hot Cool Cold and Archive tiers across capabilities including minimum retention storage cost in USD per GB per month read latency read cost online versus offline status the new 128 KiB minimum billable size effective 2026 lifecycle to Archive support and best for use case
📜 Tier comparison matrix — Hot for active data, Cool/Cold for backups, Archive only for offline retention.

♻️ Lifecycle management policies

Notably, lifecycle management is the engine that automates Azure Blob Storage tier transitions and deletions across millions of objects. Therefore, the policy is defined as a JSON document. Rules contain filters (blob types, prefix match) and actions (tierToCool, tierToCold, tierToArchive, delete). Critically, the policy runs once per day on the storage account and processes blobs asynchronously. Tier changes typically take effect within 24 to 48 hours after the condition is met.

Canonical SMB baseline lifecycle policy

Specifically, the canonical SMB baseline policy demotes through the four tiers progressively. tierToCool after 30 days unmodified. tierToCold after 90 days unmodified. tierToArchive after 365 days unmodified. delete after 7 years for compliance retention. Notably, the policy uses daysAfterModificationGreaterThan as the standard condition because it is supported on all storage account types. The daysAfterLastAccessTimeGreaterThan condition requires last access time tracking enabled at the storage account level (additional billable signal).

{
  "rules": [
    {
      "name": "wintive-baseline-tiering",
      "enabled": true,
      "type": "Lifecycle",
      "definition": {
        "filters": {
          "blobTypes": [ "blockBlob" ],
          "prefixMatch": [ "backups/", "logs/" ]
        },
        "actions": {
          "baseBlob": {
            "tierToCool":    { "daysAfterModificationGreaterThan":   30 },
            "tierToCold":    { "daysAfterModificationGreaterThan":   90 },
            "tierToArchive": { "daysAfterModificationGreaterThan":  365 },
            "delete":        { "daysAfterModificationGreaterThan": 2555 }
          },
          "version": {
            "delete":        { "daysAfterCreationGreaterThan":      90 }
          }
        }
      }
    },
    {
      "name": "wintive-soft-delete-cleanup",
      "enabled": true,
      "type": "Lifecycle",
      "definition": {
        "filters": {
          "blobTypes": [ "blockBlob" ]
        },
        "actions": {
          "baseBlob": {
            "enableAutoTierToHotFromCool": true
          }
        }
      }
    }
  ]
}

Specifically, the JSON above defines two rules on the storage account. Rule one covers backups/ and logs/ prefixes with a four-step tier transition (Hot to Cool to Cold to Archive to Delete) plus a version cleanup that deletes versions older than 90 days. Rule two enables auto-tier-to-Hot-from-Cool, which automatically promotes a blob back to Hot when it is read after being in Cool, preventing repeated demote and promote cycles for rarely-accessed-but-not-cold data. Critically, the prefixMatch filter limits scope to specific containers and folder prefixes to avoid accidental Archive transitions on hot working data.

🔐 Security — encryption and network controls

Specifically, three security layers (Furthermore, all enabled by default in 2026) protect Azure Blob Storage in 2026. Server-side encryption (SSE) is always on with 256-bit AES, using platform-managed keys by default. Customer-managed keys (CMK) via Azure Key Vault give the tenant full control of the encryption key lifecycle. The control includes key rotation and revocation. Encryption scopes provide per-container or per-blob keys for multi-tenant scenarios. Different keys protect different data classes within the same storage account.

Network controls and Private Endpoints

The network surface of Azure Blob Storage is controlled through three layers. Storage account firewall rules restrict access by IP range or by selected Virtual Networks. Service Endpoints allow access from a specific subnet over the Azure backbone but still go through the public endpoint. Private Endpoints attach the storage account to a private IP in the customer VNet, eliminating public exposure entirely. Therefore, the modern SMB pattern combines two controls. Private Endpoints for primary access. Storage firewall set to deny by default.

🛡️ Protection — soft delete, versioning, immutability

Specifically, three protection layers stack against accidental deletion and ransomware.

Soft delete and versioning for daily protection

Soft delete retains deleted blobs for a configurable retention window before permanent removal. The window is configurable from 1 to 365 days. Versioning automatically creates a new version on every blob update. The previous version is preserved for rollback.

Immutability policies: time-based and legal hold

Immutability policies (legal hold or time-based retention) prevent any modification or deletion for the configured period, even by storage account owners. Critically, immutability is the only layer that resists insider threat scenarios. The policy cannot be disabled before the retention period expires.

Az PowerShell governance for Azure Blob Storage posture

# Az PowerShell — Azure Blob Storage posture audit (tier, soft delete, public access)
Connect-AzAccount
Set-AzContext -SubscriptionId SUBSCRIPTION_ID

# 1. Inventory all storage accounts with security posture
Get-AzStorageAccount | ForEach-Object {
  $sa = $_
  [PSCustomObject]@{
    Name              = $sa.StorageAccountName
    ResourceGroup     = $sa.ResourceGroupName
    Location          = $sa.Location
    SKU               = $sa.Sku.Name
    Kind              = $sa.Kind
    AccessTier        = $sa.AccessTier
    HttpsOnly         = $sa.EnableHttpsTrafficOnly
    PublicAccess      = $sa.AllowBlobPublicAccess
    DefaultAction     = $sa.NetworkRuleSet.DefaultAction
    MinTLS            = $sa.MinimumTlsVersion
    InfrastructureEnc = $sa.RequireInfrastructureEncryption
  }
} | Format-Table -AutoSize

# 2. Audit containers with public access enabled
Get-AzStorageAccount | ForEach-Object {
  $ctx = $_.Context
  Get-AzStorageContainer -Context $ctx | \`
    Where-Object { $_.PublicAccess -ne 'Off' } | \`
    ForEach-Object {
      [PSCustomObject]@{
        StorageAccount = $_.Context.StorageAccountName
        Container      = $_.Name
        PublicAccess   = $_.PublicAccess
        Risk_Level     = 'EXPOSED'
      }
    }
} | Export-Csv -Path "C:\reports\blob-public-access-$(Get-Date -Format 'yyyy-MM-dd').csv" \`
    -NoTypeInformation

# 3. Lifecycle policy coverage report
Get-AzStorageAccount | ForEach-Object {
  $sa = $_
  $policy = Get-AzStorageAccountManagementPolicy \`
    -ResourceGroupName $sa.ResourceGroupName \`
    -StorageAccountName $sa.StorageAccountName \`
    -ErrorAction SilentlyContinue
  [PSCustomObject]@{
    StorageAccount = $sa.StorageAccountName
    HasPolicy      = ($policy -ne $null)
    RuleCount      = if ($policy) { $policy.Policy.Rules.Count } else { 0 }
    Recommendation = if (-not $policy) { 'Add baseline tiering policy' } else { 'Review existing rules' }
  }
} | Format-Table -AutoSize

Specifically, the script above covers three pillars of Azure Blob Storage governance: storage account security posture inventory, container-level public access audit, and lifecycle policy coverage reporting. Therefore, the SMB protection trade-offs table (Furthermore, the canonical reference for ransomware resilience design) below summarises how soft delete, versioning, and immutability stack against the threat model.

Protection layer trade-offs matrix

Protection layerThreat coveredCost impactTrade-off
Soft delete (blobs + containers)Accidental deleteStorage retained for windowStorage cost during retention
VersioningAccidental overwrite, ransomware encrypt-in-place1x storage per version retainedTiering rules apply per version
Immutability time-basedInsider tampering, ransomware deleteNo additional storage costCannot delete during retention
Immutability legal holdLitigation, audit holdNo additional storage costIndefinite hold until release
Customer-managed keys (CMK)Cloud provider key compromiseKey Vault HSM costOperational complexity, key rotation
Private EndpointsPublic internet exposure~$7.30/mo per endpointVNet integration required

📋 Protection layers trade-offs — stack soft delete + versioning + immutability for ransomware resilience.

Specifically, the table above summarises the six protection layers. Therefore, the prerequisites checklist below (Furthermore, validated against 60+ tenants) covers the licensing, role assignment, networking baseline, and security posture that Wintive runs on every audited Azure subscription before deploying production Azure Blob Storage workloads.

Prerequisites for Azure Blob Storage in 2026: Active Azure subscription with quota. Microsoft 365 Business Premium / E3 / E5 for M365 integration. Defender for Storage Standard plan. Contributor or Storage Blob Data Contributor role. Entra ID tenant for AAD-based authentication (preferred over Shared Key). Key Vault for CMK if required. Private DNS Zone privatelink.blob.core.windows.net for Private Endpoints. HTTPS-only + minimum TLS 1.2. Soft delete on blobs (7-30 day) and containers. Versioning on production containers. Lifecycle policy active. HIPAA + SOC 2 audits expect monthly inventory snapshots. Predictable per-GB OpEx with no on-prem CapEx, TCO modelled in Azure Pricing Calculator.

Furthermore, the Wintive baseline distribution below shows where the typical SMB Azure subscription stands on Azure Blob Storage maturity versus where it should be for safe production posture and cost-controlled tiering. Therefore, comparing readiness signals with anti-patterns highlights the operational gap that defines storage admin work in 2026 across hybrid Microsoft 365 + Azure tenants.

📈 The Wintive baseline — Azure Blob Storage across 60+ tenants

Furthermore, after assessing 60+ Microsoft 365 + Azure SMB tenants between 2025 and 2026, Wintive has a clear distribution of which Azure Blob Storage readiness signals correlate with cost-efficient and safe posture and which anti-patterns predict cloud spend overrun or data exposure. The baseline below tells the story.

Wintive baseline horizontal bar chart of Azure Blob Storage adoption signals and anti-patterns across 60 plus SMB tenants assessed 2025 to 2026 covering Storage account v2 lifecycle policy active last access tracking enabled soft delete enabled versioning enabled immutability policy Private Endpoints replacing public access and customer-managed keys via Key Vault
📈 Wintive Azure Blob Storage baseline — only 36% of tenants have a lifecycle policy active on at least one container.

Furthermore, the cost-optimisation gap is significant. Storage account v2 adoption sits at 84%. Lifecycle policy active coverage sits at 36%. The gap defines the optimisation opportunity for Azure Blob Storage in 2026. In addition, the insight callout below distils what that gap means for SMB admin practice and where the typical 2-week storage governance sprint focuses its remediation effort across hybrid M365 + Azure environments.

What the Azure Blob Storage baseline reveals for SMB tenants

Wintive insight

Across 60+ SMB Azure tenants, the standout finding is striking. 64% of audited tenants run with no lifecycle policy active, leaving everything in Hot tier regardless of access frequency. Therefore, the Wintive Azure Blob Storage playbook ships a 2-week governance sprint covering the lifecycle policy baseline rollout (Cool after 30d, Cold after 90d, Archive after 365d), the public-access audit and remediation, the Private Endpoints migration plan, and the immutability + soft delete + versioning hardening for ransomware resilience. Compared to AWS S3 Storage Class Analysis or GCP Cloud Storage Autoclass, Azure delivers the most flexible four-tier model with explicit policy control, which the SMB admin can tune precisely without paying for an automation premium. The hourly OpEx model with no on-prem CapEx commitment keeps the per-GB TCO predictable across the rollout horizon.

Furthermore, the anti-pattern column tells the operational truth. 64% have no lifecycle policy. 41% have public-access enabled containers somewhere in the tenant. 36% have storage firewalls set to allow all networks (effectively no network filter). 18% run Premium Block Blob accounts without a tiering plan to escape to General Purpose v2. These four anti-patterns explain most cost overruns and data exposure findings Wintive observes for storage in 2026, and each maps to a specific remediation path in the playbook.

🚨 5 SMB Azure Blob Storage pitfalls

Specifically, the five pitfalls below cover the anti-patterns Wintive consistently observes during Azure Blob Storage pre-deployment audits. A common mistake treats Hot tier as the universal default and never demotes data. Admins struggle with this gotcha because the Hot tier is genuinely the right choice for new uploads, but without a lifecycle policy in place, all data accumulates in Hot regardless of access frequency. Notably, comparing Azure Blob Storage with AWS S3 Storage Class Analysis or GCP Cloud Storage Autoclass shows Microsoft has the most flexible four-tier model when the policy is configured, but the most expensive default when it is not.

No lifecycle policy: everything stays in Hot tier

Specifically, 64% of audited tenants run with no lifecycle policy active on any storage account. Therefore, every uploaded blob accumulates in Hot tier regardless of how rarely it is accessed afterwards. The fix has three steps. Furthermore, inventory the storage accounts and containers via Az PowerShell. Add the wintive-baseline-tiering policy as the starter (Cool after 30d, Cold after 90d, Archive after 365d). Validate the daily lifecycle run for 48 hours before adding the second rule that demotes log streams or backup prefixes faster.

Public-access enabled on containers (data exposure risk)

Furthermore, 41% of audited tenants have at least one container with public-access enabled (Blob or Container level). Therefore, the data is reachable anonymously over the internet without any authentication. The remediation: set AllowBlobPublicAccess to false at the storage account level (which overrides container-level public access), then audit each container for legitimate static-website or public-content scenarios. For genuinely public content, use a CDN endpoint with origin authentication rather than direct public blob access.

Storage firewall set to allow all networks

Specifically, 36% of audited tenants run with the storage account firewall in DefaultAction=Allow mode. Any network can reach the storage endpoint. Therefore, the firewall provides zero attack-surface reduction. The fix has three steps. Switch to DefaultAction=Deny. Add explicit Allow rules for the specific subnets, IP ranges, or trusted Azure services that legitimately need access. Validate the application-side connectivity from each authorised network before promoting the change to production.

Lifecycle policy violates minimum retention (early-deletion fees)

Specifically, a common policy design mistake stacks tier transitions too aggressively. A policy that moves blobs from Hot to Cool after 10 days and then to Archive after 20 days incurs Cool early-deletion fees on every transitioned blob. The 30-day Cool minimum retention is not respected. The fix has three rules. Design lifecycle transitions to respect each tier minimum retention. Hot to Cool after 30+ days. Cool to Cold after 90+ days from the Cool transition. Cold to Archive after 90+ days from the Cold transition. Critically, document the prorated early-deletion model so finance can validate the cost projection.

Disaster recovery data archived without tested rehydration

Specifically, critical operational backups end up in Archive tier without a tested rehydration procedure. Therefore, when the incident response team needs the data under time pressure, the 15-hour Standard rehydration becomes a serious operational failure. The recovery window collapses. The fix: keep the most recent 30 days of backups in Cool or Cold tier (online, milliseconds latency). Move only older compliance-retention backups to Archive after testing. Document the High Priority rehydration request flow. Less than 1 hour for objects under 10 GB. Run a quarterly rehydration test to validate the recovery procedure end-to-end.

Automated Tenant Health Check — $97

Audit your Azure Blob Storage posture in 30 minutes

The Automated Tenant Health Check audits your Microsoft 365 + Azure tenant against the 40+ Azure Blob Storage checks Wintive runs on every audit, including tier distribution analysis, lifecycle policy coverage, public-access posture, soft delete and versioning configuration, immutability policy presence, Private Endpoints adoption, and the customer-managed keys configuration on Key Vault for regulated workloads. Findings are tagged Critical, High, Medium, or Low and delivered as a PDF with two emails of direct support within 48 hours.

Buy Automated Tenant Health Check — $97

❓ Azure Blob Storage FAQ

What is the difference between the Cool and Cold tiers?

The Cool tier has a 30-day minimum retention and is designed for data accessed monthly or less, with milliseconds-latency reads at higher per-read cost than Hot. The Cold tier (newer in 2026) has a 90-day minimum retention, even lower storage cost than Cool, but higher read costs and the same milliseconds-latency online access. Therefore, Cool fits backups and infrequently-accessed application data with predictable monthly read patterns. Cold fits compliance archives where the data must remain online for occasional audit but is rarely touched. Critically, both tiers will bill at minimum 128 KiB per object on new accounts from July 1, 2026, which makes Cold attractive for medium-size objects but expensive for log-line-sized small objects.

How does the Archive tier rehydration process work?

Archive tier blobs are stored offline and cannot be read directly. Therefore, before any read operation, the blob must be rehydrated to an online tier (Hot, Cool, or Cold) via a Set Blob Tier or Copy Blob operation. Standard priority rehydration takes up to 15 hours per blob. High Priority rehydration takes less than 1 hour for objects under 10 GB but costs more. Critically, lifecycle management policies cannot rehydrate from Archive: only manual or programmatic rehydration via the SDK or REST API is supported. Therefore, never put incident-response or fast-restore backups in Archive without a documented rehydration runbook tested quarterly.

How do I avoid early-deletion penalties when designing lifecycle policies?

Each access tier has a minimum retention period. Cool 30 days. Cold 90 days. Archive 180 days. Therefore, deleting a blob or moving it to a different tier before the minimum retention triggers an early-deletion fee prorated for the unused days. The fix is to design lifecycle transitions that respect each tier minimum retention. Hot to Cool after 30 or more days. Cool to Cold after 90 or more days from the Cool transition. Cold to Archive after 90 or more days from the Cold transition. Importantly, the daysAfterModificationGreaterThan condition counts from the last blob modification, not from when the blob entered the current tier, so cumulative transition timing must be calculated from the original upload date.

More Azure Blob Storage questions

How does the 128 KiB minimum billable size affect my cost from July 2026?

From July 1, 2026, new storage accounts created on or after that date will bill objects in the Cool, Cold, and Archive tiers at a minimum size of 128 KiB. From July 1, 2027, all storage accounts apply this billing behaviour. Therefore, a 4 KiB log line stored in Cool tier will bill as 128 KiB. The Hot tier is unaffected and continues to bill at actual size. Critically, this change forces a packing strategy for tenants storing many small objects: aggregate small files into larger archives (zip, parquet, or append blobs) before tiering, or keep small objects in Hot tier where the per-object minimum does not apply.

When should I use immutability policies versus soft delete plus versioning?

Soft delete plus versioning protects against accidental deletion and accidental overwrite within a configurable retention window, with the storage account owner retaining the ability to permanently delete data. Therefore, this stack is appropriate for the day-to-day data protection layer. Immutability policies (legal hold or time-based retention) prevent any modification or deletion for the configured period, even by storage account owners with full administrative privileges. Critically, immutability is the only layer that resists insider-threat scenarios and ransomware-with-credentials attacks because it cannot be disabled before the retention period expires. Therefore, stack all three layers for ransomware resilience and compliance-grade evidence retention.

📚 Related Microsoft Azure reading

How do Azure Virtual Machines store data outside the local disk?

The full admin guide is at our Deploy Azure Virtual Machines admin guide covering the security type decision tree (Trusted Launch, Confidential VM, Standard), the SKU family selection, and the disk encryption migration path from Azure Disk Encryption to Encryption at Host before September 2028.

How do I serve Blob Storage assets through Azure CDN?

The full admin guide is at our Azure CDN admin guide covering the CDN profile and endpoint setup, custom domain plus HTTPS configuration, caching rules for static blobs, and the cache purge workflow after deployments.

How do compliance policies integrate with Azure storage workloads?

The full admin guide is at our Microsoft Intune Compliance Policies Admin Guide covering the device-side compliance signals that gate access to Azure storage workloads via Conditional Access for users on managed devices.

How does Microsoft Entra ID authenticate Azure storage access?

The complete Entra ID guide is at our Microsoft Entra ID Complete Guide covering the Storage Blob Data Contributor role assignment, the Conditional Access policies that gate storage management plane access, and the audit logging that captures every key access event.

How do macOS users access Azure storage through Intune-managed apps?

The full admin guide is at our macOS App Deployment with Microsoft Intune Admin Guide covering the LOB managed PKG and DMG patterns for delivering Azure Storage Explorer or AzCopy to managed Macs, with Platform SSO providing the Microsoft Entra ID authentication for storage access.

Scroll to Top