Select Page
Screenshot of the Create virtual machine blade

Azure Stack IaaS – part five

Self-service is core to Infrastructure-as-a-Service (IaaS). Back in the virtualization days, you had to wait for someone to create a VLAN for you, carve out a LUN, and find space on a host. If Microsoft Azure ran that way, we ... continue reading
Azure Container Registry (ACR) virtual network and firewall rules preview

Azure Container Registry (ACR) virtual network and firewall rules preview

Mini Demo: Need a private registry not exposed to the internet, but still want PaaS? Try ACR VNet & firewall rules to lock down your AKS cluster, CI/CD pipeline, or other resources like your development team.Azure Container Registry (ACR)Restrict access ... continue reading
INTUNE - Intune and Autopilot Part 4 - Enroll your first device

INTUNE – Intune and Autopilot Part 4 – Enroll your first device

First published on MSDN on Nov 27, 2018In the last blog posts,we guided you through all the necessary steps to get your Azure trial Tenant up and running, and how to prepare your Intune environment further. Now it is time ... continue reading

Helping security professionals do more, better

I’m on my way to the RSA Conference in San Francisco, California, and am looking forward to connecting with our customers and partners there. We have a lot to talk about. Last week, Ann Johnson announced two new services that ... continue reading
Full software defined infrastructure in the Azure Stack portal

Azure Stack IaaS – part one

This blog post was co-authored by Daniel Savage, Principal Program Manager, Azure Stack and Tiberiu Radu, Senior Program Manager, Azure Stack. Azure Stack at its core is an Infrastructure-as-a-Service (IaaS) platform When we discuss Azure Stack with our customers, they ... continue reading
Flowchart example of a hybrid network that extends an on-premises network to Azure

Best practices to consider before deploying a network virtual appliance

A network virtual appliance (NVA) is a virtual appliance primarily focused on network functions virtualization. A typical network virtual appliance involves various layers four to seven functions like firewall, WAN optimizer, application delivery controllers, routers, load balancers, IDS/IPS, proxies, SD-WAN ... continue reading
Step-by-Step: How to configure a SQL Server 2008 R2 Failover Cluster Instance in Azure

Step-by-Step: How to configure a SQL Server 2008 R2 Failover Cluster Instance in Azure

Introduction If you are reading this article you probably are still using SQL Server 2008/2008 R2 and want to take advantage of the extended security updates that Microsoft is offering if you move your SQL Server 2008/2008 R2 into Azure ... continue reading
p2s1.jpg

Step-By-Step: Creating an Azure Point-to-Site VPN

Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We ... continue reading
XentIT Cloud Security Stack for Azure flowchart

Security for healthcare through vigilant agents and virtual patching

Healthcare organizations depend on data-driven decisions. To enable better decisions and better health outcomes, healthcare organizations are moving to the cloud. There, the latest advances in artificial intelligence, machine learning, and analytics can be more easily tested and implemented. For ... continue reading
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, ... continue reading