Configure access control for storage accounts Configure storage account access keys Configure Azure AD authentication for Azure Storage and Azure Files Different Storage Accounts types The Azure Storage platform includes the following data services: Azure Blobs A massively scalable object…
AZ-500 is continuing with the following: Create and customize alert rules by using Azure Monitor Configure diagnostic logging and log retention by using Azure Monitor Monitor security logs by using Azure Monitor Create and customize alert rules in Azure Sentinel…
Configure Azure Defender for SQL Use the Microsoft Threat Modeling Tool Configure Azure Defender for SQL Availability Aspect Details Release state: Microsoft Defender for Azure SQL database servers – Generally available (GA)Microsoft Defender for SQL servers on machines – Generally available (GA)…
Hi all, Wanted to share some news on Microsoft Authenticator new features for this Friday. Generating Strong passwords Cool feature, that wasn’t there before. Yep, it wasn’t. See the screenshots for more insights. Enable Autofill with Authenticator How do I…
And time for next section for my AZ-500 study guide, continuing with the following. Configure Azure Defender for Servers (not including Microsoft Defender for Endpoint) Evaluate vulnerability scans from Azure Defender Configure Azure Defender for Servers What is inside Defender…
And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…
Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate…
And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…
And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…
Data platforms are used in many places and Power BI is one solution to generate visual reports from different sources refined in Data platform. In this post I will cover some of the security solutions for Power BI but first…