Powered by Microsoft Azure
https://www.facebook.com/troubleshootingazure

Blogs

azure, cybersecurity, IT

Deploy ARM template using Terraform

Terraform is a tool that can be used to manage the infrastructure of a company. Terraform can be used to create, manage, and update infrastructure as code. ARM templates are files that are used to describe the infrastructure that needs to be created. In this article, I will show you how to deploy an ARM…
Read more

Azure ASG vs NSG: Which One is Right for You?

Azure application security groups and Azure network security groups are both powerful tools used to protect your applications and resources in Azure. However, there are some critical differences between the two that you should be aware of before deciding which one is right for you. Application security groups are designed to protect applications, while network…
Read more

Regulatory compliance using Defender for Cloud

The regulatory compliance dashboard in Microsoft Defender for Cloud shows your selected compliance standards with all their requirements, where supported requirements are mapped to applicable security assessments. The status of these assessments reflects your compliance with the standard. The regulatory compliance dashboard shows the status of all the assessments within your environment for your chosen…
Read more

Azure Network Manager – Get the best for the minimum amount.

Azure Virtual Network Manager (In Preview), is a central management service for your virtual network resources, significantly reducing your operational overhead. Easily manage your virtual network infrastructure while scaling your cloud-based workloads. Use the centralized solution to create and manage complex network topologies and network security rules globally across subscriptions. The brief tutorial explains how…
Read more

Check if your system is Hyper-V compatible

Here are the steps to check if your hardware / PC support Hyper V  The steps are as follows : 1. Open Run​2. Type msinfo323. Following window will pop-up4. Look out for Hyper V section (highlighted) 5. If all Hyper V options are marked as YES, then you’re good to go. In my case, Virtualisation Enabled in…
Read more

Get Ahead of Infrastructure Chaos with IaC

Why IaC? Infrastructure as code is a way of managing and automating your company’s IT infrastructure using code. Code is written in a specific language that can be read and understood by computers, which helps automate tasks and ensure your infrastructure is always up to date. In the past, infrastructure has been managed using a…
Read more

What’s New in Azure: A Summary of the Last 30 Days (July 2022)

Published date: 01 August 2022 Generally available: Azure Public IPv6 offerings are free as of July 31 Effective July 31 2022, all Public IPv6 Addresses and Public IPv6 Prefixes will be free. The Public IP billing meters will also reflect this change with updated naming: Basic IPv4 Public IP, Basic IPv4 Static Public IP, and Standard…
Read more

Microsoft Sentinel: The beginner’s guide

Azure Sentinel is a cloud-based security information and event management (SIEM) solution that enables you to detect, investigate, and respond to threats in your Azure environment. Azure Sentinel is built on the Microsoft intelligence platform, which uses artificial intelligence (AI) and machine learning (ML) to help you find threats faster. Azure Sentinel integrates with other…
Read more

What’s in Windows Registry?

The registry is a system-defined database in which applications and system components store and retrieve configuration data. The data stored in the registry varies according to the version of Microsoft Windows. The kernel, device drivers, services, SAM, user interface and third-party applications can all make use of the registry. There are five predefined root keys in Windows…
Read more

Microsoft’s Zero Trust Model: Summarised

Zero Trust Principles Verify explicitly Protect assets against attacker control by explicitly validating that all trust and security decisions use all relevant available information and telemetry. Use least privilege access Limit access to a potentially compromised asset with just-in-time and just-enough-access (JIT/JEA), and risk-based policies like adaptive access control. Assume breach Assume attackers can and…
Read more