Select Page
Wired for Hybrid - What's New in Azure Networking – May 2023

Wired for Hybrid – What’s New in Azure Networking – May 2023

Hello Folks, Azure Networking is the foundation of your infrastructure in Azure. Each month we bring you an update on What’s new in Azure Networking. In this blog post, we’ll cover what's new with Azure Networking in May 2023. Cross-region service ... continue reading
Figure 1: Network Security Group showing the inbound rule for port 8443.

Cloud Management Gateway – Inbound Rule for Port 8443

  Hello! My name is Nandan Sheth, and I am a part of Microsoft’s Customer Success Unit based out of Dublin, Ireland. I have been helping customers set up the Cloud Management Gateway for a few years now, but recently ... continue reading
Wired for Hybrid - What's New in Azure Networking – April 2023

Wired for Hybrid – What’s New in Azure Networking – April 2023

Hello Folks, Azure Networking is the foundation of your infrastructure in Azure. Each month we bring you an update on What’s new in Azure Networking. This month is a little late since we've been traveling to conferences.  We Recorded this one ... continue reading
The following image shows Azure cross-region Load Balancer connected to three regional load balancers. The regional load balancers are spread across the globe, which showcases how cross-region load balancer can achieve global load balancing.

Choose the best global distribution solution for your applications with Azure

This post was co-authored by Dave Burkhardt and Sami Modak. As part of your cloud journey, critical applications need to be deployed in multiple Azure regions to ensure high availability for your global customer base. When reviewing Azure’s various global traffic ... continue reading

DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia

Microsoft Threat Intelligence analysts assess with high confidence that a threat group tracked by Microsoft as DEV-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream. QuaDream reportedly sells a platform they call REIGN to governments ... continue reading
Azure firewall Basic serves as the hub and connects to spoke 1 and spoke 2. It includes the L3-L7 connectivity policies, Microsoft threat intelligence feature, NAT, network and application traffic filtering that allows outbound and inbound connections. Without a rule, the traffic is denied by default.

Protect against cyberattacks with the new Azure Firewall Basic

Cyberattacks continue to rise across businesses of all sizes as attackers are adapting their techniques and increasing the complexity of their operations.1 The risk of these attacks is significant for small and medium businesses (SMBs) as they usually don’t have ... continue reading
Screenshot of Create rewrite set explaining values that need to be populated for Rewrite rule.

Exploring mTLS setup to send a client certificate to the backend and OCSP validation

In our previous blog we discussed what mutual transport layer security (mTLS) is and what some of its use cases are. In this blog I want to discuss two of those use cases. First, how to send client certificate to ... continue reading
TLS

Secure your application traffic with Application Gateway mTLS

I am happy to share that Azure Application Gateway now supports mutual transport layer security (mTLS) and online certificate status protocol (OCSP). This was one of the key questions from our customers as they were looking for more secure communication ... continue reading
What's New in Azure Networking – January 2023 edition

What’s New in Azure Networking – January 2023 edition

Hello Folks, As @Michael mentioned last month Azure Networking is the foundation of your infrastructure in Azure. So, we’re happy to bring you a monthly update on What’s new in Azure Networking. In this blog post, we’ll cover what new with Azure ... continue reading
Screenshot of malware code, a script that is used to download a remote code administration tool

Microsoft research uncovers new Zerobot capabilities

Botnet malware operations are a constantly evolving threat to devices and networks. Threat actors target Internet of Things (IoT) devices for recruitment into malicious operations as IoT devices’ configurations often leave them exposed, and the number of internet-connected devices continue ... continue reading