Month: April 2022
Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate…
And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…
And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…
Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…
What was released? With 2022 H1 there came some significant update to how You manage and license your Exchange-servers in a Hybrid setup. Exchange Management Tools Update You don’t anymore need Exchange Server for management purposes (Management Hybrid) you can…
What? Microsoft rebranded Microsoft 365 compliance to Microsoft Purview and the solutions within the compliance area. Azure Purview is now Microsoft Purview, which makes a lot of sense as they all belong under Compliance offering. How to access? Open the…
And finally my AZ-500 study guide is updating again, sorry for the delay. In this section I will cover the following: Configure Azure Endpoint Protection for virtual machines (VMs) Implement and manage security updates for VMs Why to use Antimalware?…
Two main thigs that I want to concentrate in this post are ADAL deprecation and Graph PowerShell but also little bit about tokens. Microsoft is deprecating ADAL and Azure AD Graph Just as a reminder to all who it concerns….
Side note! Microsoft has some impressive numbers going on and believe me, they use the knowledge gained from those events also to your benefit with their security products! Yes, most of the the advanced features are behind a pay wall…
Not much left, next section to my SC-300 study guide will cover the following: define a privileged access strategy for administrative users (resources, roles, approvals, thresholds) configure Privileged Identity Management for Azure AD roles configure Privileged Identity Management for Azure…