Month: May 2022
And here goes the last section in my AZ-500 study guide, the end is coming with: Create and configure Key Vault Configure access to Key Vault Manage certificates, secrets, and keys Configure key rotation Configure Backup and recovery of certificates,…
Microsoft has released Cross-tenant access settings and it’s still in preview. I wrote an article in February about this feature and let’s see what has been changed. And how to use to it with Teams Teamsplaining it more Difference between…
In this section I will cover the following: Enable database authentication by using Azure AD Enable database auditing Configure dynamic masking on SQL workloads Implement database encryption for Azure SQL Database Implement network isolation for data solutions, including Azure Synapse…
Configure access control for storage accounts Configure storage account access keys Configure Azure AD authentication for Azure Storage and Azure Files Different Storage Accounts types The Azure Storage platform includes the following data services: Azure Blobs A massively scalable object…
AZ-500 is continuing with the following: Create and customize alert rules by using Azure Monitor Configure diagnostic logging and log retention by using Azure Monitor Monitor security logs by using Azure Monitor Create and customize alert rules in Azure Sentinel…
Configure Azure Defender for SQL Use the Microsoft Threat Modeling Tool Configure Azure Defender for SQL Availability Aspect Details Release state: Microsoft Defender for Azure SQL database servers – Generally available (GA)Microsoft Defender for SQL servers on machines – Generally available (GA)…
Hi all, Wanted to share some news on Microsoft Authenticator new features for this Friday. Generating Strong passwords Cool feature, that wasn’t there before. Yep, it wasn’t. See the screenshots for more insights. Enable Autofill with Authenticator How do I…
And time for next section for my AZ-500 study guide, continuing with the following. Configure Azure Defender for Servers (not including Microsoft Defender for Endpoint) Evaluate vulnerability scans from Azure Defender Configure Azure Defender for Servers What is inside Defender…
And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…