Category: Identity

Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…

Continue Reading Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…

Continue Reading Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

How handle security in a Power BI environment?

Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…

Continue Reading How handle security in a Power BI environment?

2022 H1 Cumulative Updates for Exchange Server

What was released? With 2022 H1 there came some significant update to how You manage and license your Exchange-servers in a Hybrid setup. Exchange Management Tools Update You don’t anymore need Exchange Server for management purposes (Management Hybrid) you can…

Continue Reading 2022 H1 Cumulative Updates for Exchange Server

Microsoft Compliance rebranded as Microsoft Purview

What? Microsoft rebranded Microsoft 365 compliance to Microsoft Purview and the solutions within the compliance area. Azure Purview is now Microsoft Purview, which makes a lot of sense as they all belong under Compliance offering. How to access? Open the…

Continue Reading Microsoft Compliance rebranded as Microsoft Purview

Section 6 – Configure advanced security for compute – Endpoint protection and security updates for VMs

And finally my AZ-500 study guide is updating again, sorry for the delay. In this section I will cover the following: Configure Azure Endpoint Protection for virtual machines (VMs) Implement and manage security updates for VMs Why to use Antimalware?…

Continue Reading Section 6 – Configure advanced security for compute – Endpoint protection and security updates for VMs

Old PowerShell modules vs Microsoft Graph SDK and MSAL vs ADAL

Two main thigs that I want to concentrate in this post are ADAL deprecation and Graph PowerShell but also little bit about tokens. Microsoft is deprecating ADAL and Azure AD Graph Just as a reminder to all who it concerns….

Continue Reading Old PowerShell modules vs Microsoft Graph SDK and MSAL vs ADAL

Section 17 – Plan and Implement an Identity Governance Strategy – Monitor and maintain Azure Active Directory

Side note! Microsoft has some impressive numbers going on and believe me, they use the knowledge gained from those events also to your benefit with their security products! Yes, most of the the advanced features are behind a pay wall…

Continue Reading Section 17 – Plan and Implement an Identity Governance Strategy – Monitor and maintain Azure Active Directory

Section 16 – Plan and Implement an Identity Governance Strategy – Plan and implement privileged access

Not much left, next section to my SC-300 study guide will cover the following: define a privileged access strategy for administrative users (resources, roles, approvals, thresholds) configure Privileged Identity Management for Azure AD roles configure Privileged Identity Management for Azure…

Continue Reading Section 16 – Plan and Implement an Identity Governance Strategy – Plan and implement privileged access

Section 15 – Plan and Implement an Identity Governance Strategy – Plan, implement and manage access reviews

Next section to my SC-300 study guide will cover the following: plan for access reviews create access reviews for groups and apps monitor access review findings manage licenses for access reviews automate access review management tasks configure recurring access reviews…

Continue Reading Section 15 – Plan and Implement an Identity Governance Strategy – Plan, implement and manage access reviews