Become an Azure Sentinel Ninja: The complete level 400 training

@Ofer_Sheza “I have been delivering level 400 Azure Sentinel for a while, and over time most of the training modules were recorded as webinars. In this blog post, I try to walk you through Azure Sentinel level 400 training and help you become Azure Sentinel master.   Already did the Ninja training, focus only on…”

Source: Become an Azure Sentinel Ninja: The complete level 400 training

Getting started: Windows Virtual Desktop ARM-based Azure portal

Windows Virtual Desktop can be a good fit for organizations seeking to enable remote work scenarios. As a result, the new Windows Virtual Desktop Azure Resource Manager (ARM)-based model is now available as a public preview and available to all customers. In this article, I’d like to cover the deepe…

 

Source: Getting started: Windows Virtual Desktop ARM-based Azure portal

2020-05-08 19_12_31-Getting started_ Windows Virtual Desktop ARM-based Azure portal - Microsoft Tech

#GetAzureCertified #StudyGuide #AZ500 Azure Security Engineer Associate #NeedToKnows

Certification Information

https://www.microsoft.com/en-us/learning/exam-az-500.aspx

General Study Resources

https://docs.microsoft.com/en-us/learn/azure

Skill Area Study Topics (non-exhaustive)

 

Manage Identity and Access

https://docs.microsoft.com/en-us/azure/hdinsight/domain-joined/apache-domain-joined-architecture

https://docs.microsoft.com/en-gb/azure/active-directory/privileged-identity-management/pim-deployment-plan

https://docs.microsoft.com/en-gb/azure/active-directory/privileged-identity-management/pim-getting-started

https://docs.microsoft.com/en-us/azure/security/fundamentals/choose-ad-authn

https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risk-events

https://docs.microsoft.com/en-us/azure/storage/common/storage-security-guide

https://docs.microsoft.com/en-gb/rest/api/storageservices/define-stored-access-policy

https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-start-security-review

https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-change-the-configuration

https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-groups-create-azure-portal

https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-dynamic-membership

https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-prerequisites

https://docs.microsoft.com/en-us/azure/container-registry/container-registry-roles

https://docs.microsoft.com/en-us/azure/governance/blueprints/overview

https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-custom-domain

 

Implement Platform Protection

https://docs.microsoft.com/en-us/azure/security-center/security-center-intro

https://docs.microsoft.com/en-us/azure/security-center/tutorial-security-policy

https://docs.microsoft.com/en-us/azure/security/fundamentals/antimalware

https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-dynamic-membership

https://docs.microsoft.com/en-us/azure/virtual-network/container-networking-overview

https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview#custom-routes

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/action-groups

https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time

https://docs.microsoft.com/en-us/azure/firewall/overview

https://docs.microsoft.com/en-us/azure/firewall/tutorial-firewall-deploy-portal

https://docs.microsoft.com/en-us/azure/firewall/tutorial-firewall-dnat

https://docs.microsoft.com/en-us/azure/governance/policy/overview

https://docs.microsoft.com/en-us/azure/governance/policy/assign-policy-portal

https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-and-manage

https://docs.microsoft.com/en-gb/azure/governance/policy/concepts/effects

https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources

https://docs.microsoft.com/en-us/azure/aks/ingress-tls

https://docs.microsoft.com/en-us/azure/virtual-network/security-overview

https://docs.microsoft.com/en-us/azure/azure-resource-manager/deployment-modes

https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-aks#grant-aks-access-to-acr

https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-overview

https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-prerequisites

https://docs.microsoft.com/en-us/azure/automation/automation-dsc-overview

https://docs.microsoft.com/en-us/azure/azure-monitor/learn/quick-collect-azurevm

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault

https://docs.microsoft.com/en-us/azure/automation/automation-update-management

https://docs.microsoft.com/en-us/azure/automation/manage-update-multi

 

Secure Data and Applications

https://docs.microsoft.com/en-us/azure/cosmos-db/secure-access-to-data

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection-overview

https://docs.microsoft.com/en-us/powershell/module/azurerm.keyvault/new-azurermkeyvault

https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal

https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-permissions-and-consent

https://docs.microsoft.com/en-us/azure/virtual-machines/windows/encrypt-disks

https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

https://docs.microsoft.com/en-us/azure/devops/repos/git/branch-policies-overview?view=azure-devops

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault

https://docs.microsoft.com/bs-latn-ba/azure/governance/policy/how-to/remediate-resources

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-always-encrypted-azure-key-vault

https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine

https://docs.microsoft.com/en-gb/azure/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql

https://docs.microsoft.com/en-us/azure/virtual-machines/windows/using-managed-disks-template-deployments

https://docs.microsoft.com/en-us/azure/app-service/app-service-web-configure-tls-mutual-auth

https://azure.microsoft.com/en-us/updates/app-service-and-functions-hosted-apps-can-now-update-tls-versions

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-key-rotation-log-monitoring

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-aad-authentication

https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis

https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app

https://docs.microsoft.com/en-us/azure/active-directory/develop/v1-protocols-oauth-code

https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview

Manage Security Operations

https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/log-query-overview

https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/get-started-queries

https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/examples

https://docs.microsoft.com/en-us/azure/security-center/security-center-pricing

https://docs.microsoft.com/en-us/azure/security-center/security-center-playbooks

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-action-rules

https://docs.microsoft.com/en-gb/azure/security-center/security-center-features-retirement-july2019#custom-alert-rules-preview

https://docs.microsoft.com/en-us/azure/security/fundamentals/log-audit

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-metric

https://docs.microsoft.com/en-us/azure/azure-monitor/insights/solution-targeting

 

#Azure101 #AllAboutStorage Deciding when to use #Blobs, #Files, #Disks

…Microsoft Azure provides several features in Azure Storage for storing and accessing your data in the cloud. This article covers Azure Files, Blobs, and Disks, and is designed to help you choose between these features…

https://docs.microsoft.com/en-us/azure/storage/common/storage-decide-blobs-files-disks?toc=%2fazure%2fstorage%2ffiles%2ftoc.json

ChooseAzureStorageScenarios

ChooseAzureStorageCompareFileDisk

ChooseAzureStorageCompareFileBlob

 

Understand differences between #VSTS and #TFS #Visual Studio

#InANutshell…VSTS is the cloud offering…#TFS is the On-Prem offering ….

https://docs.microsoft.com/en-us/vsts/user-guide/about-vsts-tfs?view=vsts

VSTS and Team Foundation Server (TFS) both provide an integrated, collaborative environment that supports Git, continuous integration, and Agile tools for planning and tracking work.

Fundamental differences between TFS and VSTS

When you plan a move, there are a few fundamental differences between TFS and VSTS that are important for you to understand….. Read more

 

 

 

SQL in Azure…A Tale of two Deployments (IaaS & PaaS) #AzureSQL #SQLServer

The SQL Deployment Model illustrated in a Nutshell….

 Compare-AzureSQL-SQLServer

Microsoft Documentation Articles:

 

Choose a cloud SQL Server option: Azure SQL (PaaS) Database or SQL Server on Azure VMs (IaaS):

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-paas-vs-sql-server-iaas

 

Frequently asked questions for SQL Server running on Windows Azure Virtual Machines (SQL as IaaS):

https://docs.microsoft.com/en-us/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-server-iaas-faq

 

Frequently asked questions for Azure SQL (SQL as PaaS):

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-faq

#AzureSecurity Network Security Techniques for Azure #NSG #NVA #UDR #VPN #ExpressRoute #NTierArchitecture

…Microsoft Azure platform allows customers to seamlessly extend their infrastructure into the cloud and build multi-tier architectures. Additionally, third parties can enable enhanced capabilities by offering security services and virtual appliances. This white paper provides an overview of security and architectural issues that customers should consider … It also covers creating more secure services in Azure virtual networks…

Read more here...

“…The following logic chart can direct you to a specific example of the many security techniques available with the Azure platform. For quick reference, find the example that best fits your case. For expanded explanations, continue reading through the paper….”

azurenetworksecurityflowchart

 

Example 1: Build a perimeter network (also known as DMZ, demilitarized zone, or screened subnet) to help protect applications with network security groups (NSGs).
Example 2: Build a perimeter network to help protect applications with a firewall and NSGs.
Example 3: Build a perimeter network to help protect networks with a firewall, user-defined route (UDR), and NSG.
Example 4: Add a hybrid connection with a site-to-site, virtual appliance virtual private network (VPN).
Example 5: Add a hybrid connection with a site-to-site, Azure VPN gateway.
Example 6: Add a hybrid connection with ExpressRoute.

Microsoft Azure Certification Exams Get Major ARM Refresh

Build5Nines

Over the last 2 years, since the 3 core Microsoft Azure certification exams were originally published there have been a tremendous amount of changes to the Microsoft Azure platform and ecosystem. These 3 core exams targeted towards Architecture, Infrastructure, and Developer roles were originally published before Azure Resource Manager (ARM) existed and fully covered Azure Service Manager (ASM). Not only has ARM been released since then, but also a very large number of new Microsoft Azure services have been released too! Newer services like Azure Functions, Logic Apps, DocumentDB, and others weren’t covered on these original exams.

However, these core Azure certification exams have been updated a couple times over the last 2 years. This has kept them relevant over the years, but the most recent previous update was published in March 2016, and it didn’t even full cover Azure Resource Manager (ARM) as well as a few other features and…

View original post 297 more words

Single Instance VMs Now With 99.9% SLA

Build5Nines

Since the initial release of the Virtual Machine (VM) hosting service within Microsoft Azure there’s been a limitation on achieving the minimum requirements for the 99.9% SLA guarantee. This limitation has been that you needed to provision at least 2 VMs to get the SLA guarantee. That is until now. Now, there is an option to provision a single instance VM and have the 99.9% SLA guarantee too!

Microsoft is constantly working to improve and add new features / services to the Microsoft Azure platform. Among the latest of these changes is to support a 99.9% SLA with SINGLE instance VMs. While this isn’t a replacement for multi-instance VM configurations, this offers enhanced reliability for workloads where a single VM instance works.

Single Instance VM SLA Requirement

There are a few requirements that need to be met in order to achieve the 99.9% SLA guarantee for a single instance VM…

View original post 230 more words

Azure Weekly: August 15, 2016

Build5Nines

Are you having difficulty keeping up to date on all the frequent changes and updates in the Microsoft Azure space? Then the Build Azure Weekly has the solution you’re looking for. Build Azure Weekly is a weekly blog post that includes all the latest Microsoft Azure Service Updates from the week in addition to links to many other blog articles, podcasts and videos from all over the Internet.

If you want to receive these in your email, then don’t forget to Subscribe!

Service Updates

Here’s a list of the Microsoft Azure Service Updates from over the past week:

View original post 771 more words

Bye Bye Azure RemoteApp your time is up…All Hail Citrix XenApp express #RIP_RemoteApp #Sunset

“…In a surprising move, Microsoft have announced that they are sunsetting Azure RemoteApp in favour of Citrix XenApp “express” on August 31st, 2017C…”

” … Customers have provided us consistent feedback that they want a comprehensive, end-to-end, cloud-based solution for delivering Windows apps. The best way for us to deliver this is with Citrix through XenApp “express”, currently under development. XenApp “express” combines the simplicity of application remoting and the scalability of Azure with the security, management, and performance benefits of XenApp, to deliver Windows applications to any employee on any device…”

“…Given this, we will gradually wind down the delivery of Azure RemoteApp over the next year. We are absolutely committed to ensuring our existing Azure RemoteApp customers have a smooth transition. Additional options for customers include moving to a hosted solution through one of our many hosting partners, as well as Remote Desktop Services deployed on Azure IaaS…”

Microsoft Azure Architecture Blueprints & Free Visio Symbols

Build5Nines

AzureBlueprintThumb2

Microsoft distributes some really nice looking Azure architecture diagrams / blueprints (like the one on the right) in various materials and even includes them in keynotes, presentations and other places. These really seem like they must be created with Photoshop by a graphic designer. However, this is not the case.

These architecture diagrams are created using Visio! If you have Visio, you too can get your hands on the various assets necessary to create your own awesome architecture diagrams like these!

View original post 145 more words

#HotTopic #AzureUpdate – VNET Peering | Public #ChristmasEarly

“…VNet Peering provides the ability to link two Virtual Networks in the same geo region directly. It allows Virtual Machine resources in both the VNets to connect directly through private IP addresses as if it were part of the same network. VNet peering achieves this by routing packets between the Virtual Networks through the internal Azure backbone network and thus does not involve any gateway in the path. This allows for a low latency, high bandwidth connection between the Virtual Machines in the VNets. VNet peering also allows transit through the peered VNets, thus a Network Virtual Appliance or a VPN gateway in one VNet can be used by a Virtual Machine in another peered VNet. Peering will work across VNets in different subscriptions and between an ARM (V2) and ASM (V1) VNet. It does not work between two ASM VNets….”  http://bit.ly/2awjIRe

Azure Cloud Architect Boot Camp – Onboarding Track #CSP

Join the conversation at the Azure Cloud Architect Boot Camp Yammer group

“…Course content has been developed, and will be presented, by senior Microsoft Solution Architects, Engineering, Azure Circle of Excellence (CoE) team and Customer Advisory Team (CAT). There will be a mix of presentations, case study workshops, hackathons, and Q&A panels…”

AzureArchitectBootCamp-Onboarding

 

#Azure – Design your application for High Availability #AvailabilitySet #LoadBalancer #FD #UD #CSP

Follow best practices when you design your application for high availability….

To reduce the impact of downtime due to one or more of these events, we recommend the following high availability best practices for your virtual machines:

https://azure.microsoft.com/en-us/documentation/articles/virtual-machines-windows-manage-availability/

#AllAbout Integrating #AzureAD with OnPremAD – #ADConnect #O365 #CSP

In a nutshell Azure AD Connect is what will be required to integrate on-premises directories with Azure Active Directory, which is the identity and access management service used by Office365 Services; this will allow users to access Office365 services using their on-premises AD credentials.

There are several more advanced topics to cover different on-prem directory scenarios, but below are almost the basic min level of understanding required; everything else will build on these base concepts … advanced topics will be covered in another post.

This one gets my Goat… #Premises

ITS-PREMISES

http://en.wikipedia.org/wiki/On-premise_software
“…On-premise software, is a common, although incorrect name for on-premises software. On-premises software is installed and run on computers on the premises (in the building) of the person or organisation using the software, rather than at a remote facility, such as at a server farm somewhere on the internet…
…. Grammatically, the correct term is ‘on-premises’ software, because the word premises does not have different singular and plural forms. Irrespective of correctness, however, ‘on-premise’ is sometimes used…”