Category: Security

Do You know about Azure Service tags?

With Service tags Microsoft defines services and their addresses, no more manually adding addresses to multiple services thanks to Service tags. What tags are currently supported? Bare in mind that Microsoft add new services monthly and new tags with them….

Continue Reading Do You know about Azure Service tags?

Section 1 – Implement an Identity Management Solution – Implement initial configuration of Azure Active Directory

This is the first section of SC-300 study guide and starting with: configure and manage Azure AD directory roles configure and manage custom domains configure and manage device registration options configure delegation by using administrative units configure tenant-wide settings Configure…

Continue Reading Section 1 – Implement an Identity Management Solution – Implement initial configuration of Azure Active Directory

SC-300 exam preparation series

Can’t stop learning, in parallel to AZ-500 I will start SC-300 study guide. Enjoy! The Sections There are multiple different sections in the exam, I wrote them more clearly below than in Microsoft Learn site. The sections are based on Microsoft…

Continue Reading SC-300 exam preparation series

Section 5 – Implement platform protection – Implement advanced network security – Azure Firewall

Time for the next part in the AZ-500 study preparation guide. This time were looking at: Create and configure Azure Firewall Create and configure Azure Firewall Manager What is Azure Firewall? Azure Firewall is a cloud-native and intelligent network firewall…

Continue Reading Section 5 – Implement platform protection – Implement advanced network security – Azure Firewall

Azure AD Verifiable Credentials (PowerShell version)

In this blog post I will cover the setup Verifiable Credentials but first. What are Verifiable credentials? We use IDs in our daily lives. We have drivers licenses that we use as evidence of our ability to operate a car….

Continue Reading Azure AD Verifiable Credentials (PowerShell version)

Section 5 – Implement platform protection – Implement advanced network security – Hybrid and virtual networks

In this part we will be discover the following: Secure the connectivity of hybrid networks Secure the connectivity of virtual networks Best practices for securing Your networks: There is a lot more than these but these are a good way…

Continue Reading Section 5 – Implement platform protection – Implement advanced network security – Hybrid and virtual networks