Deploy ARM template with Terraform
Terraform is a tool that can be used to manage the infrastructure of a company. Terraform can be used to create, manage, and update infrastructure as code. ARM templates are…
Azure, Cybersecurity, Cloud, AI
Terraform is a tool that can be used to manage the infrastructure of a company. Terraform can be used to create, manage, and update infrastructure as code. ARM templates are…
Azure application security groups and Azure network security groups are both powerful tools used to protect your applications and resources in Azure. Both the vital for Azure Security and easy…
The regulatory compliance dashboard in Microsoft Defender for Cloud shows your selected compliance standards with all their requirements, where supported requirements are mapped to applicable security assessments. The status of…
Azure Virtual Network Manager (In Preview), is a central management service for your virtual network resources, significantly reducing your operational overhead. Easily manage your virtual network infrastructure while scaling your…
Here are the steps to check if your hardware / PC support Hyper V The steps are as follows : 1. Open Runโ2. Type msinfo323. Following window will pop-up4. Look…
Why IaC? Infrastructure as code is a way of managing and automating your company’s IT infrastructure using code. Code is written in a specific language that can be read and…
Published date: 01 August 2022 Generally available: Azure Public IPv6 offerings are free as of July 31 Effective July 31 2022, all Public IPv6 Addresses and Public IPv6 Prefixes will…
Azure Sentinel is a cloud-based security information and event management (SIEM) solution that enables you to detect, investigate, and respond to threats in your Azure environment. Azure Sentinel is built…
The registry is a system-defined database in which applications and system components store and retrieve configuration data. The data stored in the registry varies according to the version of Microsoft…
Zero Trust Principles Verify explicitly Protect assets against attacker control by explicitly validating that all trust and security decisions use all relevant available information and telemetry. Use least privilege access…
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.