Month: May 2022

Section 15 – Secure data and applications – Configure and manage Azure Key Vault

And here goes the last section in my AZ-500 study guide, the end is coming with: Create and configure Key Vault Configure access to Key Vault Manage certificates, secrets, and keys Configure key rotation Configure Backup and recovery of certificates,…

Continue Reading Section 15 – Secure data and applications – Configure and manage Azure Key Vault

What’s new with Cross-tenant access with Azure AD External Identities

Microsoft has released Cross-tenant access settings and it’s still in preview. I wrote an article in February about this feature and let’s see what has been changed. And how to use to it with Teams Teamsplaining it more Difference between…

Continue Reading What’s new with Cross-tenant access with Azure AD External Identities

Section 14 – Secure data and applications – Configure security for databases

In this section I will cover the following: Enable database authentication by using Azure AD Enable database auditing Configure dynamic masking on SQL workloads Implement database encryption for Azure SQL Database Implement network isolation for data solutions, including Azure Synapse…

Continue Reading Section 14 – Secure data and applications – Configure security for databases

Section 13 – Secure data and applications – Configure security for storage

Configure access control for storage accounts Configure storage account access keys Configure Azure AD authentication for Azure Storage and Azure Files Different Storage Accounts types The Azure Storage platform includes the following data services: Azure Blobs A massively scalable object…

Continue Reading Section 13 – Secure data and applications – Configure security for storage

Section 12 – Manage security operations – Configure and manage security monitoring solutions

AZ-500 is continuing with the following: Create and customize alert rules by using Azure Monitor Configure diagnostic logging and log retention by using Azure Monitor Monitor security logs by using Azure Monitor Create and customize alert rules in Azure Sentinel…

Continue Reading Section 12 – Manage security operations – Configure and manage security monitoring solutions

Section 11 – Manage security operations – Configure and manage threat protection – Defender for SQL and Threat Model Tool

Configure Azure Defender for SQL Use the Microsoft Threat Modeling Tool Configure Azure Defender for SQL Availability Aspect Details Release state: Microsoft Defender for Azure SQL database servers – Generally available (GA)Microsoft Defender for SQL servers on machines – Generally available (GA)…

Continue Reading Section 11 – Manage security operations – Configure and manage threat protection – Defender for SQL and Threat Model Tool

Microsoft authenticator password generator and couple of other new features

Hi all, Wanted to share some news on Microsoft Authenticator new features for this Friday. Generating Strong passwords Cool feature, that wasn’t there before. Yep, it wasn’t. See the screenshots for more insights. Enable Autofill with Authenticator How do I…

Continue Reading Microsoft authenticator password generator and couple of other new features

Section 10 – Manage security operations – Configure and manage threat protection

And time for next section for my AZ-500 study guide, continuing with the following. Configure Azure Defender for Servers (not including Microsoft Defender for Endpoint) Evaluate vulnerability scans from Azure Defender Configure Azure Defender for Servers What is inside Defender…

Continue Reading Section 10 – Manage security operations – Configure and manage threat protection

Section 9 – Manage security operations – Configure centralized policy management

And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…

Continue Reading Section 9 – Manage security operations – Configure centralized policy management