Select Page
Figure 1: Network Security Group showing the inbound rule for port 8443.

Cloud Management Gateway – Inbound Rule for Port 8443

  Hello! My name is Nandan Sheth, and I am a part of Microsoft’s Customer Success Unit based out of Dublin, Ireland. I have been helping customers set up the Cloud Management Gateway for a few years now, but recently ... continue reading
varghesejoji_0-1683354527983.png

Mastering AKS Troubleshooting #3: Kernel view and AKS Observability

Introduction This blog post concludes the three part series that addresses common networking problems that may occur while working with Azure Kubernetes Service (AKS). Although AKS is a managed container orchestration service, issues can still arise, requiring troubleshooting.   The ... continue reading
varghesejoji_11-1683334250677.png

Mastering AKS Troubleshooting #1: Resolving Connectivity and DNS Failures

Introduction AKS or Azure Kubernetes Service is a fully managed Kubernetes container orchestration service that enables you to deploy, scale, and manage containerized applications easily. However, even with the most robust systems issues can arise that require troubleshooting.    This ... continue reading
HoussemDellai_0-1682930879981.png

Kubernetes External DNS for Azure DNS & AKS

Introduction After deploying an application and its services into a Kubernetes cluster, a question rises on the surface, how to access it with a custom domain name ? A simple solution would be to create an A record that points ... continue reading
The following image shows Azure cross-region Load Balancer connected to three regional load balancers. The regional load balancers are spread across the globe, which showcases how cross-region load balancer can achieve global load balancing.

Choose the best global distribution solution for your applications with Azure

This post was co-authored by Dave Burkhardt and Sami Modak. As part of your cloud journey, critical applications need to be deployed in multiple Azure regions to ensure high availability for your global customer base. When reviewing Azure’s various global traffic ... continue reading
Screenshots of Outlook on Windows showing how to set a custom sound that plays when a reminder is triggered

Guidance for investigating attacks using CVE-2023-23397

This guide provides steps organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2023-23397. A successful exploit of this vulnerability can result in unauthorized access to an organization’s environment by triggering a Net-NTLMv2 ... continue reading
Line chart showing trend of number of daily DDoS attacks targeting healthcare

KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks

In the last year, geopolitical tension has led to an uptick of reported cybercrime events fueled by hacktivist groups. The US Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn organizations about these attacks and teamed with the ... continue reading
Chart depicting the number of daily DDoS attacks throughout 2022.

2022 in review: DDoS attack trends and insights

As organizations strengthen their defenses and take a more proactive approach to protection, attackers are adapting their techniques and increasing the sophistication of their operations. Cybercrime continues to rise with the industrialization of the cybercrime economy providing cybercriminals with greater ... continue reading

DDoS Mitigation with Microsoft Azure Front Door

This blog post was authored by Dave Burkhardt, Principal Product Manager, and co-authored by Harikrishnan M B, Program Manager, and Yun Zheng, Sr Program Manager. Within the last few years, the complexity and size of distributed denial-of-service (DDoS) attacks have ... continue reading
CaryRoys_1-1676319059673.png

What is an Azure Load Balancer?

  A lot of folks who are new to Azure assume that load balancers in Azure are logically equivalent to load balancers in their on-premises data centers.  These load balancers are typically a device (sometimes a VM) which functions as ... continue reading