Azure Policy Guest Configuration – Using Tags for Configuration of Features
The preview for being able to audit and correct settings inside of a virtual machine using Azure Policy Guest Configuration is available now, this post explores deploying settings into the virtual machine. Recently on a POC with a customer we ... continue reading
Azure & Desired State Configuration Part 4/4
Index Part 1 : Focus on Desired State Configuration in PowerShell Part 2 : Focus on Deploying with DevOps Pipeline Part 3 : Focus on Azure Automation Account Part 4 : Focus on DSC in Automation Account Scenario Until now ... continue reading
Azure & Desired State Configuration Part 1/4
Scenario I recently had a customer that requested some demo's on how they could use Azure Automation, Azure Devops and PowerShell Desired State Configuration to Automate their deployments and increase the quality of deployments. In this 4 Part Series I ... continue reading
Introduction to Azure AD B2C for IT Pros
Though Microsoft’s Azure Active Directory is the underlying identity platform for Azure resources and Microsoft 365 applications, there are two other identity capabilities with specific functions – Azure AD B2B and Azure AD B2C. Azure AD B2B lets you allow ... continue reading

Advancing Azure Virtual Machine availability transparency
“Throughout our Advancing Reliability blog series we’ve explained various techniques used by the Azure platform to prevent technical issues from impacting customers’ virtual machines (VMs) or other resources—like host resiliency with Project Tardigrade, cautious safe deployment practices taking advantage of ... continue reading
How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure Functions
Summary One of the top 10 Azure consuming companies has multiple country government-mandated requirements to block egress to and ingress from IP addresses and IP address ranges on a dynamic embargoed/sanctioned IP list. In other words, various country governments across ... continue reading
Introducing Attribute Based Access Control (ABAC) in Azure
The public preview of Attribute Based Access Control (ABAC) in Azure builds on Azure Role-Based Access Control (RBAC) to make it easier for organizations to manage access to Azure resources at scale. This first release of ABAC supports Azure Storage ... continue reading
Upload Files to Azure Blob Storage using Power Automate Desktop
In this blog post, we are going to have a look at how you can automatically upload files to an Azure Blob storage account using Power Automate Desktop. Power Automate Desktop is a great tool to build automation on your ... continue reading

Threat matrix for storage
The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading

Azure Defender for Storage powered by Microsoft threat intelligence
This blog post was co-authored with Roy Levin, Senior Data Scientist With the reality of working from home, more people and devices are now accessing corporate data across home networks. This raises the risks of cyber-attacks and elevates the importance ... continue reading