0

Azure DevOps has been busy rolling out improvements through the fall of 2025, with more on the way heading into 2026.

Azure DevOps Updates September 2025
Azure DevOps Updates September 2025

DevOps engineers and IT managers have a lot to dig into, especially around pipelines, work tracking in Boards, and security integrations. In a nutshell: pipelines are getting easier to manage and more flexible, Boards is adding helpful new productivity features (and even some AI assistance), and security is being tightened and better integrated with GitHub’s advanced tools. Below, we’ll break down the key changes from September 2025 and highlight why they matter, as well as what to look forward to in the coming months.

Azure Pipelines: Easier Management with Managed Pools and More

Managed DevOps Pools Improvements: One of the headline updates for Azure Pipelines has been a series of enhancements to Managed DevOps Pools (the Azure-managed agent infrastructure). If you’re using these pools, you’ve likely noticed new conveniences and some changes aimed at reliability. For example, starting at the end of September 2025, any new Managed DevOps Pool you create will automatically come with an Azure NAT gateway attached for outbound internet access. This ensures your build agents have stable egress IPs (important for accessing external services securely) now that Azure is retiring the old default outbound IP mechanism. The trade-off is that a NAT gateway can incur a bit of Azure cost, so teams will want to be aware of that. On the plus side, Microsoft provided a handy Service Tag for these pools and introduced additional static outbound IP ranges, which makes it much easier to whitelist Azure DevOps agents in your firewall by a single tag. They also integrated Log Analytics support, meaning you can pipe your agent logs into Azure Monitor and run KQL queries to analyze pipeline logs centrally. This is a big win for troubleshooting – instead of digging through individual build logs, you can query failures or performance trends across many runs.

Daily management of self-hosted infrastructure is also getting smoother. Azure DevOps now allows project admins to create Managed DevOps Pools that are scoped just to their project, without needing organization-level permissions. In practice, this means each project team can spin up its own pool of build agents (backed by Azure VMs) if needed, isolated from other projects, which simplifies delegation in large orgs. There’s also a new “purge/recycle agent” feature – essentially a button to manually reset an agent VM if it’s gotten into a bad state or you just want a fresh environment for the next job. And for easier identification, you can now assign a friendly alias to your pool separate from the underlying Azure resource name. These seem like small quality-of-life tweaks, but they add up to less friction in pipeline administration.

Pipeline Flexibility and Parity: Azure DevOps has continued closing the gaps between classic release pipelines and YAML pipelines, pushing everyone toward YAML. By Q3 2025, key deployment features reached parity – for instance, you can now resume specific pipeline stages out of order or on demand rather than always running the whole pipeline sequence. Similarly, “stage-level traceability” was improved so you can trace which stage deployed which artifact or work item, bringing more clarity to multi-stage releases. These changes might not be flashy, but they smooth out daily CI/CD use: teams have more control to rerun just the needed stage, and auditors or developers can more easily see what happened at each stage of a deployment. Meanwhile, Microsoft is keeping the hosted agent images fresh. In late 2025 they added new images like Ubuntu 24.04, Windows Server 2025, and macOS 15 “Sequoia” for use in pipelines. (Notably, a preview of macOS on Apple Silicon agents is available, which is great news for iOS/macOS developers needing faster build times.) In short, pipeline infrastructure is getting both more powerful and more transparent.

Looking ahead, Azure Pipelines will continue to evolve in early 2026. The roadmap shows some exciting additions on deck: Pinned VM image versions for Managed Pools will let you freeze the agent image to a specific version if a newer update ever breaks your builds (no more sudden surprises from image updates). Cost-conscious teams can also look forward to Spot VM support – the ability to run pipeline agents on Azure Spot instances, potentially saving up to 90% on agent VM costs for non-critical workloads. Spot agents might occasionally get evicted, but for many CI jobs that’s an acceptable trade-off for big savings. Another forthcoming feature is containerized agents, where the pool can spin up a container and run the Azure Pipelines agent inside it. This opens the door to custom build environments (you could prepare a Docker image with all your specific tools and have each build use that), and it provides extra isolation. Along similar lines, Microsoft plans to let you specify a startup script that runs on each new agent instance – perfect for configuring environment settings or installing self-hosted tooling on the fly before the pipeline jobs start. All these pipeline improvements aim to give DevOps teams more control, reliability, and efficiency in their CI/CD process.

Azure Boards: Smarter Work Tracking with Checklists and Copilot

Azure Boards hasn’t been standing still either – the last part of 2025 brought some very handy updates for managing work items and tracking progress. If your team uses work items (stories, tasks, bugs, etc.), you might have already noticed the new dynamic checklist feature in the description and discussion fields. Essentially, any Markdown-enabled text field in a work item now supports interactive checkboxes. This means you can write a checklist (using –  Markdown syntax) in, say, a task’s description or acceptance criteria and then click to toggle the boxes on or off right there without editing the field. It feels trivial, but think of the use cases: you can jot down a to-do list of sub-tasks or test cases within a story and check them off as you go, or product owners can list acceptance criteria and devs can tick them off when satisfied. Before, you’d have to edit the text or remember what’s done; now it’s one click, very much like how checklists in pull request descriptions work. This little enhancement makes work items more “active” and saves time updating status – a nice boost for daily scrums and personal task management.

Boards is also getting an infusion of AI assistance, thanks to a new integration with GitHub Copilot that went into private preview in September 2025. This is a pretty futuristic leap: Azure Boards can now connect a work item to the GitHub Copilot “coding agent” – effectively allowing you to delegate the coding of that work item to AI (with human review, of course). Here’s how it works in preview form: you create or open a work item (for example, a bug or a user story) and use the new option to “Create a pull request with GitHub Copilot.” You’ll provide some instructions or context in the work item description, then send it off to Copilot. Behind the scenes, Copilot takes the work item’s details (including the description and any recent discussion comments) and spins up a fresh branch in your linked GitHub repo. It then attempts to generate a draft pull request that addresses the task – this could mean code for a bug fix, an incremental feature implementation, added test coverage, documentation changes, you name it. The draft PR that Copilot creates is linked back to the Azure Boards work item for full traceability, so you can track that the work item has an active PR. Once Copilot thinks it’s done, it even updates the work item’s status and drops a comment to notify you that the draft PR is ready for review. This integration is still in private preview (teams have to sign up to get access), but it hints at a new paradigm where some boilerplate or routine coding tasks can be offloaded to an AI agent. In a real-world workflow, a developer might use this to quickly get a first pass at a solution and then focus on reviewing and refining the AI’s pull request. It’s a glimpse of how DevOps processes might shift in the near future – with AI taking on more of the grunt work for developers. Keep an eye on this in 2026; as it matures and possibly becomes generally available, it could change how teams approach minor fixes and feature experiments.

Beyond those marquee features, Boards had a quieter but important makeover in 2025. The new Azure Boards Hub (a refreshed UI for Boards) became the default experience for all users by mid-2025. The new interface is snappier and more modern, with improvements in how backlogs, sprint boards, and queries are displayed. If you’ve been using Azure Boards for a while, you likely noticed the UI change – things like a revamped work item form and better readability. There was also an update to enable Markdown editing in multi-line text fields, which makes descriptions and comments easier to format and read (you can use rich text or Markdown now, rather than the old plain-text editor). These UI/UX tweaks, combined with features like checklists, make the daily use of Boards a bit more pleasant and efficient. One thing to note: Microsoft decided to deprecate the old “Clone work item” function in favor of just using “Copy work item.” They found most users weren’t using clone much, and copy does nearly the same thing (letting you duplicate an item and then edit fields before saving) – so as of the latest update, the Clone button is gone. It’s a minor housekeeping change, but worth knowing if your team had clone in any part of your process. Overall, Azure Boards is balancing small quality-of-life improvements with big new capabilities like the Copilot integration – all with the aim of smoothing out how you track and deliver work.

Security and GitHub Advanced Security: Keeping Your Code Safer

Security has been a huge focus in late 2025 for Azure DevOps. Microsoft is continuing to tighten security best practices in the platform itself, while also deeply integrating GitHub Advanced Security features for those using Azure Repos. Let’s unpack a few of the most impactful changes.

One-Time OAuth Secrets: In September 2025, Azure DevOps made a fundamental change to how OAuth app secrets are handled – they will now show you client secrets only at creation time, one time ever. After you generate an OAuth client secret (for a service connection or an Azure DevOps OAuth app), you won’t be able to peek at it again in the UI or retrieve it later via API. This “one-time reveal” approach aligns with industry best practices (it’s how GitHub apps and cloud providers handle secrets) and greatly reduces the risk of accidental secret leakage. In practical terms, if you create a new client secret, you must copy it immediately to a secure location (like Azure Key Vault) – if lost, you’ll need to generate a new secret rather than trying to retrieve the old one. Along with this, Microsoft retired the old API that fetched OAuth secrets to reinforce the point that these values are sensitive credentials, not meant to be stored or fetched after initial creation. They even introduced new secret rotation APIs that support having overlapping active secrets to ensure you can roll over credentials without downtime. For DevOps teams, this means slightly adjusting your workflows – no more treating the Azure DevOps portal as a password manager. It’s a good nudge to store secrets properly and rotate them regularly. If you have any scripts or tools that relied on reading client secrets from Azure DevOps, those will need to be changed. Overall, this update is part of Azure DevOps’ “secure-first” initiative to harden the platform, and while it requires a bit more discipline with secret management, it significantly lowers the chances of secret spillage (which is a common root cause of security incidents).

GitHub Advanced Security (GHAS) Integration: 2025 has really been the year Azure DevOps embraced GitHub’s Advanced Security features to augment code safety in Azure Repos. By September, GitHub Advanced Security for Azure DevOps – which includes code scanning (CodeQL), secret scanning, and dependency scanning – is widely available as an add-on, and Microsoft has shipped a bunch of enhancements to make it easier to use and more informative. One big improvement landed in the Security Overview dashboard for Azure DevOps. This is the “single pane of glass” where you can see security alerts across projects and repositories. In the spring, Microsoft had added filtering on the Risk tab (to let you slice and dice alerts by project, type, or time window). Now, as of September’s update, the Coverage tab got some love too – you can filter by repository enablement state and search by project or repo name, which is super useful if you have many repos. In fact, they added a new “State” filter for security coverage that lets you zero in on repos based on whether Advanced Security features are enabled or not (e.g. show me all repos that haven’t enabled dependency scanning yet). The coverage page was previously just a big list of repositories and their status, but now you have a search bar and project dropdown to quickly find specific projects or repos and see what’s turned on where. All these filter settings also carry through to the URL, so you can share a filtered view with a colleague by sending the link. The goal here is to help orgs identify gaps in their security coverage and onboard projects more easily. In fact, to further drive adoption, Azure DevOps introduced granular enablement controls at the project and org level – essentially, after you hit “Enable all” for Advanced Security, you can now fine-tune which sub-features are active (like maybe you want secret scanning on everything but only turn on code scanning for certain repos, etc.). Before, those granular switches were only at the repo level, but now your security admins can manage things in bulk more flexibly.

On the topic of enabling security in bulk, another preview feature from mid-2025 that’s worth noting is the one-click dependency scanning enablement. Azure DevOps added an option in repository settings where, with a single checkbox, you can turn on dependency scanning for the repo’s default branch without editing any pipeline YAML. Once this is opted in, Azure DevOps will automatically inject the dependency scanning task into any pipeline run targeting the default branch (or into pull request validations) if you haven’t already added that task in your YAML. This was a public preview as of June 2025, but it signals a direction: Microsoft wants advanced security features to be as easy as flipping a switch, so teams have fewer excuses to delay enabling them. We might see a similar “one-click CodeQL” setup coming (the roadmap hints at a default CodeQL onboarding experience) to simplify code scanning setup for repositories. For DevOps teams, this means you can gradually turn on security scans across your projects with minimal hassle – and catch vulnerabilities or leaked secrets early in the cycle, before they become a problem.

Smarter Secret Scanning (Validity Checks): Anyone who’s dealt with secret scanning knows it can be noisy – you get an alert that a secret (API key, token, etc.) was found in code, but sometimes that secret was already revoked or is a false positive. In August 2025, Azure DevOps enabled secret validity checks to tackle this problem. Now, when the integrated secret scanning detects a credential in your Azure Repos code, it will automatically try to verify if that credential is actually still active. The result is a new field on the alert indicating status: it will tag the leaked secret as “Active” if it’s still usable, or “Unknown” if it couldn’t verify (for example, the provider didn’t respond, or it’s an unsupported secret type). This is a huge help for prioritization – an “Active” secret leak is essentially a five-alarm fire (the key is valid and someone could potentially misuse it right now), whereas an “Unknown” might mean it’s already invalid or it’s at least not confirmed active. As the product team nicely put it, this lets you “fast-path the truly risky stuff and spend less time chasing ghosts.” In practice, your security team can filter the Alerts list to show only Active secrets and focus on those first. It doesn’t automatically remediate anything for you, but it gives a clear signal so you’re not treating every leaked key with equal panic. This feature went generally available by August, so by September most orgs with Advanced Security should see it. It’s part of a broader effort to reduce alert fatigue and make Advanced Security results more actionable.

Better Integration and Tracking: Azure DevOps has also improved how security findings tie into your development workflow. Early in 2025 they introduced the ability to link Azure Boards work items to security alerts in Advanced Security. This means if you have, say, a security vulnerability or code scanning alert that you need to fix, you can create or link a work item (like a bug) to that alert. The linkage is bi-directional – from the Boards work item you can see associated security alerts, and from the security alert you can jump to the work item tracking its remediation. You can even link multiple alerts to a single bug (or vice versa) if, for example, one code change will resolve several findings. This is super helpful for keeping your existing backlog and tracking process while still ensuring security issues are visible to all stakeholders. Instead of security issues living in a separate silo or spreadsheet, they’re managed just like any other work, with full visibility in Azure Boards. Another integration touch: service hooks for security alerts became generally available, meaning you can trigger notifications or automation when new alerts pop up or when they change state. For instance, you might integrate with Teams or Slack to notify the team if a critical vulnerability is detected in a repo, or hook into an ITSM tool to log a ticket. All these features underscore that Azure DevOps is treating security findings as first-class citizens in the DevOps lifecycle.

As a final note on security, there’s a strategic shift underway: Azure DevOps is preparing to retire its legacy OAuth authentication in favor of Microsoft Entra ID (Azure AD) by 2026. In fact, as of April 2025 they stopped allowing new Azure DevOps OAuth app registrations, nudging everyone to use Entra ID based apps going forward. This is mostly an internal detail – it affects how third-party tools and custom integrations authenticate with Azure DevOps – but it’s worth being aware of. If your organization has any custom apps or pipeline tasks using the old OAuth app model, you’ll need to migrate them to the newer Entra ID app model before the 2026 cutoff. The good news is the platform provided features like the overlapping secret support we mentioned (so you can add new credentials while keeping old ones active until the switch). Continuous Access Evaluation was also enabled, meaning Azure DevOps will react faster to changes in user access (like if someone’s account is revoked or they leave the company, their token is invalidated in near-real-time) – a behind-the-scenes improvement that bolsters security for enterprises. All told, Microsoft is tightening identity security and aligning Azure DevOps with modern cloud security standards, which ultimately keeps your code and pipelines safer from unauthorized access.

Looking Ahead: Early 2026 Expectations

The latter half of 2025 set the stage for some exciting changes, and early 2026 is poised to continue that trend. On the pipelines front, many of the Managed DevOps Pool enhancements discussed (like Spot VMs, containerized agents, and custom startup scripts) are slated to arrive in preview or GA in Jan–Feb 2026, giving teams new ways to optimize build infrastructure. We’ll also likely see the new pipeline Triggers management UI (a centralized place to view and edit pipeline triggers across YAML and classic) come to fruition, as it was on the roadmap. This could simplify the headache of managing scheduled runs or CI triggers without digging through YAML files. Additionally, keep an eye out for more AI assistance in Azure DevOps: given the private preview success of Boards’ Copilot integration, it wouldn’t be surprising if Microsoft expands AI integration into other areas – perhaps an AI that can draft pipeline YAML or suggest test cases. Nothing official on that yet, but the trend is clear.

For Azure Boards, early 2026 might bring the general availability of the Copilot integration if feedback is positive. We also anticipate improvements in automating work item handling – the roadmap mentions “Automated work item rules,” which could allow custom rules to update fields or state based on triggers (for example, auto-close a work item when a linked pull request is completed, etc.). Boards has steadily been refining its UX, so any remaining rough edges in the new Boards Hub will likely be smoothed out as well.

Security will continue to be front and center. GitHub Advanced Security for Azure DevOps will probably get even more tightly integrated. Features that GitHub has introduced, like Dependabot security updates (automatic PRs to fix vulnerable dependencies), are on Azure DevOps’s radar as well. The roadmap shows Dependabot-style automated security fixes and a one-click CodeQL default setup coming in the future. This means by early 2026, enabling code scanning on all your Azure Repos could be as easy as a single button – no pipelines to configure at all – which would remove a lot of friction from securing code. And with the groundwork laid for filtering and prioritizing alerts, we expect more UI enhancements in the Security Overview, possibly even a unified “Security Dashboard” where you can manage risk and coverage in one place. Microsoft also hinted at streaming Advanced Security events into the Azure DevOps audit log, which would be great for compliance tracking – security folks will be able to see a history of who dismissed an alert and when, or when a repo was enabled/disabled for scanning, all in the audit trails.

In summary, Azure DevOps is evolving in ways that should make DevOps practitioners smile: routine tasks are being automated or streamlined, collaboration between dev and ops (and now security) is improving, and new capabilities are coming that could change how we approach software delivery (hello, AI-assisted development!). The updates in late 2025 – from Managed Pool tweaks to Boards checklists and advanced security tooling – all aim to save time or reduce pain points in daily workflows. A DevOps engineer can spend less effort babysitting build agents or chasing false-positive alerts, and more time delivering value. An IT manager can feel more confident that the platform is secure by default and that the team has the tools to work efficiently. As we move into 2026, keep an eye on those preview features and roadmap promises. Features like Spot VM agents and deeper GitHub integration might shift some daily habits (perhaps you’ll adjust your pipeline to use spot instances for cost savings, or your PM will start assigning simple tasks to Copilot). The Azure DevOps team’s casual mantra lately could well be “work smarter, not harder,” and these updates reflect that. It’s an exciting time to be in the DevOps space – and if you’re using Azure DevOps, there’s plenty to explore and experiment with as these new features land. Here’s to a more streamlined and secure DevOps workflow in 2026!

Have a Question ?

Fill out this short form, one of our Experts will contact you soon.

Call Us Today For Your Free Consultation