Monthly Archives: July 2017

Azure User Roles

The Azure key vault is designed to be administered and used by different types of individuals. This spreads the responsibility and enforces the principle of least privilege. Security operations. This person, often an IT professional, is responsible for administration of the key … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Azure Virtual Machines (PowerShell)

There are two main methods to deploy virtual machines with PowerShell. The first method is the easiest way to create a VM and uses the New-AzureQuickVM command.  With this command you can provision a single virtual machine using an image. Windows or … Continue reading

Posted in Azure Virtual Machine, Azure Virtual Machine | Leave a comment

Azure Alerts

You can receive an https://azure.microsoft.com/en-us/documentation/articles/insights-receive-alert-notifications/ When the value of an alert rule crosses an assigned threshold, the alert rule becomes active and can send a notification. For an alert rule on events, a rule can send a notification on every … Continue reading

Posted in Azure Virtual Machine | Leave a comment

Azure Monitoring

Monitoring and Diagnostics The administrator enables and configures VM diagnostics from the Monitoring area of the new portal VM blade. An administrator can enable diagnostic logging for: Basic metrics Network and web metrics .NET metrics Windows event system logs Windows … Continue reading

Posted in Azure Virtual Machine | Leave a comment

Azure Configuration Management Tools

Deploying and maintaining the desired state of your servers and application resources can be tedious and error prone. Azure supports several configuration management systems. Desired State Configuration (DSC) With Azure automation Desired State Configuration (DSC), you can consistently deploy, reliably monitor, and … Continue reading

Posted in Azure Virtual Machine | Leave a comment

Azure Threat Detection

Threat Detection detects anomalous database activities indicating potential security threats to the database. You can use auditing to explore the suspicious events and determine if they result from an attempt to access, breach or exploit data in the database. On … Continue reading

Posted in Azure Database | Leave a comment

Azure Migration Approaches

This topic defines the most appropriate approach to move the targeted workload into Azure. The migration approach will be partly determined by the target environment within Azure (IaaS, PaaS, or some combination of the two). Example approaches include: IaaS Reinstalling … Continue reading

Posted in Migration to Azure | Leave a comment

Azure Authentication and Authorization

Security considerations should always be front and center in the planning for an Azure migration, so an understanding of the key security-related differences between an on-premises and cloud deployment is very important. How the application accomplishes authentication and authorization must … Continue reading

Posted in Migration to Azure | Leave a comment

Shared Access Signature for Azure

A shared access signature (SAS) is a URI that grants restricted access rights to Azure Storage resources. You can provide a shared access signature to clients who should not be trusted with your storage account key but whom you wish to delegate … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Storage access keys for Azure

Storage access keys are used to authenticate your applications when making requests to the Azure storage account. It is important that you store your access keys securely – for example, using Azure Key Vault – and don’t share them. We recommend regenerating your … Continue reading

Posted in Azure Security and Compliance | Leave a comment