Azure Management

Step-by-Step : Assign access packages automatically based on user properties in Microsoft Entra ID

Microsoft Entra ID Governance offers the capability to manage the access lifecycle of resources through access packages, which are organized into catalogs and define the resources available within them. Each access package includes at least one policy that outlines who can request access to it, the approval process, and access lifecycle settings such as assignment …

Step-by-Step : Assign access packages automatically based on user properties in Microsoft Entra ID Continue Reading

Azure MMA Agent Bulk Removal

Hello, it has been a while since I have posted any articles, but my little buddy Raven (my miniature schnauzer) and I are here to talk about the Microsoft Monitoring Agent (MMA). Raven has an old, worn-out bed that she has been using for years. It has lost its cushioning, doesn’t offer much comfort anymore, …

Azure MMA Agent Bulk Removal Continue Reading

Azure OpenAI Architecture Patterns and implementation steps

Introduction A comprehensive overview of the most frequently used and discussed architecture patterns among our customers in various domains. 1) AOAI with Azure Frontdoor for loadbalancing Architecture diagram: Key Highlights: If you set equal weights for all origins and a high latency sensitivity in Azure Front Door, it will consider all origins that have a …

Azure OpenAI Architecture Patterns and implementation steps Continue Reading

Simplified security settings management is now generally available

At a time when threats like ransomware are becoming increasingly sophisticated and agile, having device security settings properly configured can be the difference between preventing an attack and experiencing a breach. Misconfigurations account for 21% of all error-related breaches, so security teams need a solution that makes posture management easy. Microsoft Defender for Endpoint enables …

Simplified security settings management is now generally available Continue Reading

Microsoft Defender for Cloud latest protection against sophisticated abuse of Azure VM Extensions

Introduction Throughout recent years, the IT world has shifted its workloads, management layers, and machines to the cloud, thus introducing a new attack surface, accompanied by new attack vectors. The following introduced a tactic for threat actors to deploy their cyber-attacks against organizations’ cloud environments, gaining strong permissions, operating for financial gain, and more. Upon succeeding …

Microsoft Defender for Cloud latest protection against sophisticated abuse of Azure VM Extensions Continue Reading

Automatic Conditional Access policies in Microsoft Entra streamline identity protection

Extending our commitment to help customers be secure by default, today we’re announcing the auto-rollout of Microsoft Entra Conditional Access policies that will automatically protect tenants based on risk signals, licensing, and usage. We’ve designed these policies based on our deep knowledge of the current cyberthreat landscape to help our customers strengthen their security baseline, …

Automatic Conditional Access policies in Microsoft Entra streamline identity protection Continue Reading

Calling Azure Resource APIs from Power Automate Using Graph Explorer

Introduction In today’s fast-paced technological landscape, cloud integration and automation have ascended as twin pillars of modern business efficiency. Microsoft’s Azure and Power Automate are two titans in this arena, each offering a unique set of capabilities. But what if we could marry the vast cloud resources of Azure with the intuitive workflow automation of …

Calling Azure Resource APIs from Power Automate Using Graph Explorer Continue Reading

Project Flash update: Advancing Azure Virtual Machine availability monitoring

Flash, as the project is internally known, derives its name from our steadfast commitment to building a robust, reliable, and rapid mechanism for customers to monitor virtual machine (VM) health. Our primary objective is to ensure customers can reliably access actionable and precise telemetry, promptly receive alerts on changes, and periodically monitor data at scale. …

Project Flash update: Advancing Azure Virtual Machine availability monitoring Continue Reading