Author: Harri Jaakkonen

Section 13 – Secure data and applications – Configure security for storage

Configure access control for storage accounts Configure storage account access keys Configure Azure AD authentication for Azure Storage and Azure Files Different Storage Accounts types The Azure Storage platform includes the following data services: Azure Blobs A massively scalable object…

Continue Reading Section 13 – Secure data and applications – Configure security for storage

Section 12 – Manage security operations – Configure and manage security monitoring solutions

AZ-500 is continuing with the following: Create and customize alert rules by using Azure Monitor Configure diagnostic logging and log retention by using Azure Monitor Monitor security logs by using Azure Monitor Create and customize alert rules in Azure Sentinel…

Continue Reading Section 12 – Manage security operations – Configure and manage security monitoring solutions

Section 11 – Manage security operations – Configure and manage threat protection – Defender for SQL and Threat Model Tool

Configure Azure Defender for SQL Use the Microsoft Threat Modeling Tool Configure Azure Defender for SQL Availability Aspect Details Release state: Microsoft Defender for Azure SQL database servers – Generally available (GA)Microsoft Defender for SQL servers on machines – Generally available (GA)…

Continue Reading Section 11 – Manage security operations – Configure and manage threat protection – Defender for SQL and Threat Model Tool

Microsoft authenticator password generator and couple of other new features

Hi all, Wanted to share some news on Microsoft Authenticator new features for this Friday. Generating Strong passwords Cool feature, that wasn’t there before. Yep, it wasn’t. See the screenshots for more insights. Enable Autofill with Authenticator How do I…

Continue Reading Microsoft authenticator password generator and couple of other new features

Section 10 – Manage security operations – Configure and manage threat protection

And time for next section for my AZ-500 study guide, continuing with the following. Configure Azure Defender for Servers (not including Microsoft Defender for Endpoint) Evaluate vulnerability scans from Azure Defender Configure Azure Defender for Servers What is inside Defender…

Continue Reading Section 10 – Manage security operations – Configure and manage threat protection

Section 9 – Manage security operations – Configure centralized policy management

And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…

Continue Reading Section 9 – Manage security operations – Configure centralized policy management

Key auto-rotation in Azure Key Vault now GA!

Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate…

Continue Reading Key auto-rotation in Azure Key Vault now GA!

Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…

Continue Reading Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…

Continue Reading Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

How handle security in a Power BI environment?

Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…

Continue Reading How handle security in a Power BI environment?