Blog Stats
- 336,311 Visits
Pages
My eBooks
Awards
Monthly Archives: July 2017
Azure User Roles
The Azure key vault is designed to be administered and used by different types of individuals. This spreads the responsibility and enforces the principle of least privilege. Security operations. This person, often an IT professional, is responsible for administration of the key … Continue reading
Posted in Azure Security and Compliance
Leave a comment
Azure Virtual Machines (PowerShell)
There are two main methods to deploy virtual machines with PowerShell. The first method is the easiest way to create a VM and uses the New-AzureQuickVM command. With this command you can provision a single virtual machine using an image. Windows or … Continue reading
Azure Alerts
You can receive an https://azure.microsoft.com/en-us/documentation/articles/insights-receive-alert-notifications/ When the value of an alert rule crosses an assigned threshold, the alert rule becomes active and can send a notification. For an alert rule on events, a rule can send a notification on every … Continue reading
Posted in Azure Virtual Machine
Leave a comment
Azure Monitoring
Monitoring and Diagnostics The administrator enables and configures VM diagnostics from the Monitoring area of the new portal VM blade. An administrator can enable diagnostic logging for: Basic metrics Network and web metrics .NET metrics Windows event system logs Windows … Continue reading
Posted in Azure Virtual Machine
Leave a comment
Azure Configuration Management Tools
Deploying and maintaining the desired state of your servers and application resources can be tedious and error prone. Azure supports several configuration management systems. Desired State Configuration (DSC) With Azure automation Desired State Configuration (DSC), you can consistently deploy, reliably monitor, and … Continue reading
Posted in Azure Virtual Machine
Leave a comment
Azure Threat Detection
Threat Detection detects anomalous database activities indicating potential security threats to the database. You can use auditing to explore the suspicious events and determine if they result from an attempt to access, breach or exploit data in the database. On … Continue reading
Posted in Azure Database
Leave a comment
Azure Migration Approaches
This topic defines the most appropriate approach to move the targeted workload into Azure. The migration approach will be partly determined by the target environment within Azure (IaaS, PaaS, or some combination of the two). Example approaches include: IaaS Reinstalling … Continue reading
Posted in Migration to Azure
Leave a comment
Azure Authentication and Authorization
Security considerations should always be front and center in the planning for an Azure migration, so an understanding of the key security-related differences between an on-premises and cloud deployment is very important. How the application accomplishes authentication and authorization must … Continue reading
Posted in Migration to Azure
Leave a comment
Shared Access Signature for Azure
A shared access signature (SAS) is a URI that grants restricted access rights to Azure Storage resources. You can provide a shared access signature to clients who should not be trusted with your storage account key but whom you wish to delegate … Continue reading
Posted in Azure Security and Compliance
Leave a comment
Storage access keys for Azure
Storage access keys are used to authenticate your applications when making requests to the Azure storage account. It is important that you store your access keys securely – for example, using Azure Key Vault – and don’t share them. We recommend regenerating your … Continue reading
Posted in Azure Security and Compliance
Leave a comment