Category: Security
And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…
And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…
And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…
What was released? With 2022 H1 there came some significant update to how You manage and license your Exchange-servers in a Hybrid setup. Exchange Management Tools Update You don’t anymore need Exchange Server for management purposes (Management Hybrid) you can…
What? Microsoft rebranded Microsoft 365 compliance to Microsoft Purview and the solutions within the compliance area. Azure Purview is now Microsoft Purview, which makes a lot of sense as they all belong under Compliance offering. How to access? Open the…
And finally my AZ-500 study guide is updating again, sorry for the delay. In this section I will cover the following: Configure Azure Endpoint Protection for virtual machines (VMs) Implement and manage security updates for VMs Why to use Antimalware?…
Two main thigs that I want to concentrate in this post are ADAL deprecation and Graph PowerShell but also little bit about tokens. Microsoft is deprecating ADAL and Azure AD Graph Just as a reminder to all who it concerns….
Side note! Microsoft has some impressive numbers going on and believe me, they use the knowledge gained from those events also to your benefit with their security products! Yes, most of the the advanced features are behind a pay wall…
Not much left, next section to my SC-300 study guide will cover the following: define a privileged access strategy for administrative users (resources, roles, approvals, thresholds) configure Privileged Identity Management for Azure AD roles configure Privileged Identity Management for Azure…
Next section to my SC-300 study guide will cover the following: plan for access reviews create access reviews for groups and apps monitor access review findings manage licenses for access reviews automate access review management tasks configure recurring access reviews…