Select Page
What is shutting down my Azure Virtual Machine?

What is shutting down my Azure Virtual Machine?

Recently I came across a scenario where someone had changed the time on a scheduled Azure virtual machine shut down, but the VM was not adhering to the shut down new time.. Learn how asking the wrong question can cause ... continue reading

MS Build playlist for IT Pros

Coming together online-only for the first time, Microsoft's annual developer conference ran 48 hours of live content across three main time regions (USA, Asia Pacific and the UK). Having your pick of all the content from the comfort of your ... continue reading
Azure AD security enforcement with Continuous Access Evaluation

Azure AD security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading
Timely security enforcement with Continuous Access Evaluation

Timely security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading
Troubleshooting Azure Arc for Servers - Status Offline

Troubleshooting Azure Arc for Servers – Status Offline

While trying out the capabilities of Azure Arc for Servers, I came across a couple of times when the on-premises virtual machine showed as ‘Offline’ in the Azure Portal. To help troubleshoot this, there’s a command line tool that can ... continue reading
identity-protection-policies.png

What’s the difference between Azure Active Directory Identity Protection and Conditional Access?

If you’ve moved your Identity service to Azure Active Directory, or if you’ve connected your Active Directory to Azure Active Directory, you might be interested in what additional security features Microsoft can provide. With Azure Active Directory (AAD), Microsoft has ... continue reading
How to Implement Center for Internet Security (CIS) recommendations for Azure

How to Implement Center for Internet Security (CIS) recommendations for Azure

In the big wide world of security, it can be hard to know what Azure resource settings give you the best possible security posture. Organisations like the USA-based National Institute of Standards and Technology and the Center for Internet Security ... continue reading
Celebrating International Women's Day - Meet the ITOpsTalk women

Celebrating International Women's Day – Meet the ITOpsTalk women

International Women’s Day is celebrated each year on March 8, so our team is stealing today’s blog post to highlight our Women IT Pros. The 2020 theme is “Each for equal” and every member on our team makes a significant ... continue reading
Onboarding to Azure Lighthouse using a template

Onboarding to Azure Lighthouse using a template

Azure Lighthouse enables you to see and manage Azure resources from different tenancies, in the one place, with the power of delegated administration. That tenancy may be a customer (for example, if you're a managed services provider with a support ... continue reading
ResourceGroups-AllCustomers.jpg

Managing security with Azure Lighthouse and Azure Arc

I've previously blogged about Azure Lighthouse, for managing multiple difference Azure tenancies. This capability is useful for both Managed Service Providers, with support arrangements for multiple customers, and for large or complex Enterprise organizations (for example, if there are sub-brands ... continue reading