Select Page
Power BI Premier Offering

Premier Offerings: An Introduction to Power BI Related Offerings

In this series of articles, we will present Premier Services Offerings around Power BI. In this first one we will succinctly present them all, but we will publish other articles to deep dive on those different offers highlighting their values ... continue reading

Premier Offerings: WorkshopPLUS Azure Security Best Practices

G ‘day, I am Vic Perdana, Sr. PFE based in Melbourne, Australia. As COVID-19 forces people to work from home, the number of bad actors is ramping up as demonstrated by the increase of cyber-attacks globally, it is becoming *very* ... continue reading
1.png

Protect and Secure Cloud-based Applications using Azure MFA

Introduction In this article, we're going to talk about enabling MFA for applications that are accessed over the internet. This will force users accessing the application from the internet to authenticate with their primary credentials as well as a secondary ... continue reading

Defending SMB Clients from Interception Attacks

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading

Defending SMB Clients from Interception Attacks

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading
image002.png

Endpoint Configuration Manager – Site Server High Availability

Overview Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server ... continue reading
Anthony_W_0-1592784724912.png

Tagging Azure Resources with a Creator

Hello everyone, my name is Anthony Watherston and I am a Senior Premier Field Engineer in Melbourne Australia. A question was recently raised by a colleague about how we can tag an Azure resource with the name of the person ... continue reading
:smile:

Azure Kubernetes Service Cluster Capacity Planning

This article focuses on network capacity planning of AKS clusters but keep in mind folks that it is important that for a complete capacity planning, compute and storage resources must also be considered. How many nodes do I need in ... continue reading

SMB Traffic Control

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security by controlling SMB traffic's ingress, egress, and lateral movement. You'll learn best practices, hands-on steps, and gain a deeper understanding ... continue reading
calico.png

Network Policy in Kubernetes using Calico

Introduction to the problem All pods in Kubernetes can reach each other. For example, the frontend can reach the backend and the backend can reach the database. That is expected and normal. But this openness can make problems like: The ... continue reading