Select Page
varghesejoji_0-1696267105785.png

Unlocking Azure Secrets: Using Identities for Key Vault Access

Azure Key Vault is essential for securely managing keys, secrets, and certificates. Managed Identities (MI) allow Azure resources to authenticate to any service that supports Azure AD authentication without any credentials in your code.  For those looking to swiftly test ... continue reading
AndrewCoughlin_1-1691754421265.png

Move backups in Recovery Service Vault from LRS/GRS to ZRS while preserving the data

Introduction Hello everyone, Andrew Coughlin here and I am a Cloud Solutions Architect at Microsoft focusing on Azure Infrastructure. I have frequently received questions from customers about how to move their virtual machines from an LRS/GRS recovery services vault to ... continue reading
Step-by-Step Guide : Azure AD PIM for Groups

Step-by-Step Guide : Azure AD PIM for Groups

Azure AD Privileged Identity Management (PIM) offers organizations a comprehensive solution for managing, monitoring, and auditing access to their Azure resources. Among its key functionalities, Azure AD PIM allows the implementation of just-in-time (JIT) access to both Azure AD and ... continue reading

Deploying Microsoft Defender for Servers in Network-Restricted Environments

Microsoft Defender for Servers (part of the Microsoft Defender for Cloud security suite), being a comprehensive solution for server protection across multi-cloud and hybrid environments, requires the deployment of several agents to achieve its multiple protection capabilities. As many of ... continue reading
BrunoGabrielli_10-1688495639401.png

Azure Monitor: Gain Observability On Your DHCP Server

Hello readers, It is common that customers need to expand the observability over the entire IT infrastructure (see Azure Monitor: Expanding the Out-of-the-Box Observability for your IT Infrastructure). This includes one of the requests I got to gain observability over ... continue reading
Microsoft Cyber Defense Operations Center.

Meet unprecedented security challenges by leveraging MXDR services

We know customers of every size face ever-increasing security risks. In just the last 12 months the speed of attackers leveraging breaches is also increasing, as it only takes 72 minutes on average for an attacker to access private data ... continue reading
New App Health Recommendations in Microsoft Entra Workload Identities

New App Health Recommendations in Microsoft Entra Workload Identities

We recently announced our 2023 State of Cloud Permissions Risks report, which laid out some interesting and eye-opening findings on not just the expansion of cloud environments, but the increase in identity types accessing critical cloud resources. The report reveals ... continue reading
Supercharge your skills with Microsoft CLX tracks for Azure

Supercharge your skills with Microsoft CLX tracks for Azure

The Microsoft Azure Connected Learning Experience (CLX) program is expanding with three new tracks for Azure professionals. Enhance your Azure networking, Microsoft Sentinel in Azure, and Windows Server migration skills your way with these personalized and self-paced courses that help you ... continue reading
wernerrall_0-1683126727375.png

Tidying Up URLs: Removing Trailing Slashes in Azure Static Web Apps

Introduction In the ever-evolving digital landscape, the importance of clean, well-structured URLs cannot be overstated. A well-crafted URL not only improves user experience, but it also boosts your website's SEO ranking. One common issue web developers and content creators face ... continue reading

Empowering developers in the new Developer Center

This week at Microsoft Build, we introduced Microsoft Entra External ID, our next generation of customer identity and access management (CIAM) solution that evolves Azure AD External Identities to help developers efficiently build secure and compliant applications for customers, partners, and more ... continue reading