
Bring your own IP addresses (BYOIP) to Azure with Custom IP Prefix
When planning a potential migration of on-premises infrastructure to Azure, you may want to retain your existing public IP addresses due to your customers' dependencies (for example, firewalls or other IP hardcoding) or to preserve an established IP reputation. Today, ... continue reading
Troubleshooting Windows containers apps on Azure Kubernetes Service
Alright, it’s time to bring together everything we learned so far in this series. Previously, we looked at the simplest way to collect logs, how to use the Log Monitor tool, and how to make things simpler with Windows Admin ... continue reading

Manage port forwarding for backend pool with Azure Load Balancer
Starting today, Azure Load Balancer enables customers to manage port forwarding for Virtual Machine Scale Sets or a group of virtual machines in a backend pool with a single set-up with minimum management overhead. What is port forwarding? Port forwarding ... continue reading

Microsoft DDoS protection response guide
Receiving Distributed Denial of Service (DDoS) attack threats? DDoS threats have seen a significant rise in frequency lately, and Microsoft stopped numerous large-scale DDoS attacks last year. This guide provides an overview of what Microsoft provides at the platform level, ... continue reading
Infrastructure as Code (IaC): Comparing the Tools
When you go to deploy a server or any part of our infrastructure manually, how long does it take you? Can you do a manual deployment end to end without any mistakes? Now, how do you scale that? This is ... continue reading

Azure DDoS Protection—2021 Q3 and Q4 DDoS attack trends
This blog post was co-authored by Anupam Vij, Principal PM Manager, and Syed Pasha, Principal Network Engineer, Azure Networking In the second half of 2021, the world experienced an unprecedented level of Distributed Denial-of-Service (DDoS) activity in both complexity and ... continue reading

SONiC opens more opportunities for network innovation
SONiC, as an open-source operating system for network devices, has been growing rapidly in the last five years. According to Gartner Market Guide for Data Center Switching published early this year, they predict, “By 2025, 40 percent of organizations that ... continue reading

Simplify connectivity, routing, and security with Azure Virtual WAN
Over the past few months, we added several new capabilities to Azure Virtual WAN which customers can embrace to significantly simplify routing design and management in Azure, and secure traffic flows. Before we introduce these new capabilities, let us revisit ... continue reading

Adopting a Zero Trust approach throughout the lifecycle of data
Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading
NDES Security Best Practices
Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading