Select Page
Azure Policies for Automating Azure Governance - Automating Policies

Azure Policies for Automating Azure Governance – Automating Policies

In my earlier Azure Policy post, I covered issues and concerns organizations may face and how many built in Azure policies can address these problems.  Now we are going to take it a step further and discuss how to enforce policies ... continue reading
Arc Hybrid Worker Setup Diagram

How To Automate The Hybrid World Part One Of Two

Hi, Jonas here! Or as we say in the north of Germany: "Moin Moin!"I’m a Microsoft Senior Cloud Solution Architect – Engineering (or short Sr. CSA-E) and in this article I want to talk about how to automate the hybrid world. Over ... continue reading
DarrenTurchiarelli_5-1661811658809.png

Domain Join a Storage Account Leveraging Azure Automation

Are you looking to take the next step in your cloud journey and pivot away from managing file servers? Why not look at Azure Files! In short; Azure Files offers fully managed file shares in the cloud that are accessible ... continue reading
Azure Virtual Machines Automation - Deployment

Azure Virtual Machines Automation – Deployment

Welcome to this series where you will learn the various best practices for deploying Azure Virtual Machines and how to manage them at scale. To get started, we are going to take a look at various deployment options; how you ... continue reading

Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog ... continue reading
Logs with time stamps showing start and completion of the core network deployment.

Azure powers rapid deployment of private 4G and 5G networks

As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading
hspinto_0-1654852954197.png

Azure DDoS Protection Standard Costs Estimation

If you are considering the activation of Azure DDoS Protection Standard – a great solution to better protect your Azure Virtual Network (VNet) resources from DDoS attacks – you may ask yourself: Which VNet(s) should you enable the service in? ... continue reading
Illustration of the Custom IP Prefix onboarding process.

Bring your own IP addresses (BYOIP) to Azure with Custom IP Prefix

When planning a potential migration of on-premises infrastructure to Azure, you may want to retain your existing public IP addresses due to your customers' dependencies (for example, firewalls or other IP hardcoding) or to preserve an established IP reputation. Today, ... continue reading
Microsoft Defender for Cloud Dashboard featuring security posture chart, Firewall manage, regulatory compliance status, and workload protections.

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc

As businesses around the world grapple with the growth of an industrialized, organized attacker ecosystem, the need for customers to secure multicloud and hybrid infrastructure and workloads is increasingly urgent. Today, organizations face an attacker ecosystem that is highly economically ... continue reading
AlanLaPietra_0-1648554341870.png

Microsoft Defender Ecosystem

DEFENDER FOR CLOUD Microsoft Defender for Cloud - an introduction | Microsoft Docs Defender for Cloud is a tool for security posture management and threat protection. It strengthens the security posture of your cloud resources, and with its integrated Microsoft ... continue reading