Select Page
pic1.png

Azure Policy Guest Configuration – Using Tags for Configuration of Features

The preview for being able to audit and correct settings inside of a virtual machine using Azure Policy Guest Configuration is available now, this post explores deploying settings into the virtual machine. Recently on a POC with a customer we ... continue reading
wernerrall_0-1628084204317.png

Azure & Desired State Configuration Part 4/4

Index Part 1 : Focus on Desired State Configuration in PowerShell Part 2 : Focus on Deploying with DevOps Pipeline Part 3 : Focus on Azure Automation Account Part 4 : Focus on DSC in Automation Account Scenario Until now ... continue reading
wernerrall_0-1628070359608.png

Azure & Desired State Configuration Part 1/4

Scenario I recently had a customer that requested some demo's on how they could use Azure Automation, Azure Devops and PowerShell Desired State Configuration to Automate their deployments and increase the quality of deployments. In this 4 Part Series I ... continue reading
Introduction to Azure AD B2C for IT Pros

Introduction to Azure AD B2C for IT Pros

Though Microsoft’s Azure Active Directory is the underlying identity platform for Azure resources and Microsoft 365 applications, there are two other identity capabilities with specific functions – Azure AD B2B and Azure AD B2C. Azure AD B2B lets you allow ... continue reading
A screenshot of the Azure portal “resource health” blade showing the health history of a resource.

Advancing Azure Virtual Machine availability transparency

“Throughout our Advancing Reliability blog series we’ve explained various techniques used by the Azure platform to prevent technical issues from impacting customers’ virtual machines (VMs) or other resources—like host resiliency with Project Tardigrade, cautious safe deployment practices taking advantage of ... continue reading
Figure 1

How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure Functions

Summary One of the top 10 Azure consuming companies has multiple country government-mandated requirements to block egress to and ingress from IP addresses and IP address ranges on a dynamic embargoed/sanctioned IP list. In other words, various country governments across ... continue reading
Introducing Attribute Based Access Control (ABAC) in Azure

Introducing Attribute Based Access Control (ABAC) in Azure

The public preview of Attribute Based Access Control (ABAC) in Azure builds on Azure Role-Based Access Control (RBAC) to make it easier for organizations to manage access to Azure resources at scale. This first release of ABAC supports Azure Storage ... continue reading
Upload Files to Azure Blob Storage using Power Automate Desktop

Upload Files to Azure Blob Storage using Power Automate Desktop

In this blog post, we are going to have a look at how you can automatically upload files to an Azure Blob storage account using Power Automate Desktop. Power Automate Desktop is a great tool to build automation on your ... continue reading
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
Security alert of malware hash reputation analysis

Azure Defender for Storage powered by Microsoft threat intelligence

This blog post was co-authored with Roy Levin, Senior Data Scientist With the reality of working from home, more people and devices are now accessing corporate data across home networks. This raises the risks of cyber-attacks and elevates the importance ... continue reading