Network Security Group Monitoring
By: Date: 09/06/2021 Categories: azure Tags:

Intro Brad Watts here to explore monitoring of your Network Security Groups (NSGs). I was approached recently by a customer wanting to better understand changes being made to the many NSGs in their environment. Working with them, we came up with an Azure Workbook that provides a centralized view of both current settings on your NSGs along with any changes that have been…

Read More →
VPN access to Azure from macOS with Azure Active Directory authentication
By: Date: 03/06/2021 Categories: azure Tags:

Whether you are using Microsoft Azure for development, for production workloads, or for both, it’s important to consider the security of the connections to those cloud systems. Virtual private networks are often used to encrypt traffic between a device and Azure using a private tunnel over the public internet – especially for information and systems…

Read More →
Deploying DDoS Protection Standard with Azure Policy
By: Date: 25/05/2021 Categories: azure Tags:

One of the most important questions customers ask when deploying Azure DDoS Protection Standard for the first time is how to manage the deployment at scale. A DDoS Protection Plan represents an investment in protecting the availability of resources, and this investment must be applied intentionally across an Azure environment. Creating a DDoS Protection Plan and…

Read More →
Azure WAF Custom Rule Samples and Use Cases
By: Date: 25/05/2021 Categories: azure Tags:

This post will detail how to use Custom Rules on Azure WAF, including some examples of common use cases fulfilled by this rule type. Custom Rules provide a versatile way to build controls that fulfill security requirements and protect applications from attacks that are unique to your applications. WAF Rule Types and Processing Azure WAF…

Read More →
Azure Firewall Manager Is Now Integrated with Azure Security Center
By: Date: 19/05/2021 Categories: azure Tags:

Introduction Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud – whether they’re in Azure or not – as well as on premises.  Azure Firewall Manager is a security management service that provides…

Read More →
Introducing AWS App Runner
By: Date: 18/05/2021 Categories: AWS Tags:

App Runner provides per-second execution billing and everything you need to run secure production workloads. With a few clicks, you can have a container running with a public endpoint, verified TLS certificate, and automatic scaling. Through App Runner, you can bring your existing containers, or use the integrated container build service to go directly from…

Read More →
Azure Storage — Attribute-based Access Control (ABAC) now available for preview
By: Date: 07/05/2021 Categories: azure Tags:

Attribute-based access control (ABAC) is an authorization strategy that defines access levels based on attributes associated with security principals, resources, requests, and the environment. Azure ABAC builds on role-based access control (RBAC) by adding conditions to Azure role assignments in the existing identity and access management (IAM) system. This preview includes support for role assignment conditions on Blobs…

Read More →
Action required: upgrade your AML cluster to Ubuntu 18.04 LTS by 30 April 2021
By: Date: 23/04/2021 Categories: azure Tags:

Azure Machine Learning (AML) is an enterprise grade service that provides compute infrastructure for your ML needs. Azure Machine Learning’s managed-compute infrastructure allows you to easily create a compute instance (CI) or a single or multi-node compute cluster. Starting 30 April 2021, Ubuntu is ending standard support for Ubuntu 16.04 LTS (read more on the Ubuntu release blog) and as a result, Microsoft will replace…

Read More →
Log Analytics Windows Agent for Winter 2021 now generally available
By: Date: 13/04/2021 Categories: azure Tags:

The Log Analytics Windows Agent for Winter 2021 is now available. This release contains a new troubleshooting tool andchanges to how the agent handles certificate changes in Azure Services. As always, we suggest using the latest agent available. If you have installed the Log Analytics Agent for Windows by using Azure extensions and have automatic extension updates turned on, this update…

Read More →
Introducing Packet Monitor
By: Date: 09/04/2021 Categories: azure Tags:

Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the infrastructure capabilities like routing and switching are being integrated into the endpoints. The additional complexity in…

Read More →
General availability: Kubernetes v1.20 support in AKS
By: Date: 31/03/2021 Categories: azure Tags:

AKS support for Kubernetes release 1.20 is now generally available. Kubernetes 1.20 delivers a total of 42 enhancements in various stages of maturity. These include capabilities such as CSI Volume Snapshot graduating to stable, Kubectl Debug to Beta, and introduction of new capabilities such as Graceful Node Shutdown in Alpha. Learn more about Kubernetes release 1.20…

Read More →
Using VPC Traffic Mirroring to monitor and secure your AWS infrastructure
By: Date: 18/03/2021 Categories: AWS Tags:

VPC Traffic Mirroring is an AWS feature used to copy network traffic from the elastic network interface of an EC2 instance to a target for analysis. This makes a variety of network-based monitoring and analytics solutions possible on AWS. By capturing the raw packet data required for content inspection, VPC Traffic Mirroring enables agentless methods for…

Read More →
Using Service Principal with AzCopy & Azure CLI to manage blobs in Storage Account
By: Date: 06/03/2021 Categories: azure Tags:

In this blog we will look at using service principals with AzCopy and Azure CLI to connect to storage accounts and manage blob data. An Azure service principal is an identity created for use with applications, hosted services, and automated tools to access Azure resources. This access is restricted by the roles assigned to the…

Read More →
Azure Front Door enhances secure cloud CDN with intelligent threat protection
By: Date: 19/02/2021 Categories: azure Tags:

This blog post was co-authored by Jessie Jia, Senior Program Manager The Internet is the new corporate network and the fabric that connects users, devices, and data to applications of all types. It is foundational to how organizations run their businesses, engage their customers, conduct commerce, operate their supply chain, and enable their employees to work from anywhere. However, while the Internet is highly scalable and ever expanding, it…

Read More →
Azure Firewall Premium now in public preview
By: Date: 18/02/2021 Categories: azure Tags:

With the new Azure Firewall Premium now in public preview, you can now perform the following new capabilities: Transport Layer Security (TLS) Inspection: Azure Firewall Premium decrypts outbound traffic, performs the required value-added security functions and re-encrypt the traffic which is sent to the original destination. Intrusion Detection and Prevention System (IDPS): Azure Firewall Premium…

Read More →
Simplifying Global Network Architecture
By: Date: 18/11/2020 Categories: AWS Tags:

Deploying new applications and workloads can require big changes to your network. Read what the Enterprise Strategy Group found during their technical validation of AWS Transit Gateway. This report, Simplifying Global Network Architecture, dives into the tradeoffs and benefits of building networks with AWS Transit Gateway. It details their findings from technical validation with three customers using AWS…

Read More →
A lot of people have been waiting for this: VNet peering and Azure Bastion (Preview) ☁
By: Date: 13/11/2020 Categories: azure Tags: ,

Azure Bastion and VNet peering can be used together. When VNet peering is configured, you don’t have to deploy Azure Bastion in each peered VNet. This means if you have an Azure Bastion host configured in one virtual network (VNet), it can be used to connect to VMs deployed in a peered VNet without deploying…

Read More →
Enhancing internet and cloud security with Red Hat’s contribution the Guide to IPsec VPNs
By: Date: 12/11/2020 Categories: azure

Virtual private network (VPN) technology has changed immensely since the publication of the original Guide to IPsec VPNs (SP 800-77) in 2005. The guide was recently reworked and modernized, and Red Hat engineers lent a hand to updating this important document. The updated document takes into consideration the evolution of cryptography, software and hardware capabilities,…

Read More →
Red Hat’s product documentation is changing
By: Date: 05/11/2020 Categories: azure

Once upon a time, the term “product documentation” conjured images of ring-bound tomes several thousand pages long that would get shipped to users alongside the latest offering. In the days before the internet, this wasn’t just the best option available; it was the only option. It was big, it was slow, and it was expensive,…

Read More →
Getting started with RHEL System Comparison
By: Date: 20/10/2020 Categories: azure

We’ve all been in situations where something works on one system, but not another, and we’re not sure why. Perhaps your boss is asking “Why does this work in the test environment, but not production?” and you need an answer as soon as possible.  In the past when this has happened, I would open SSH…

Read More →
AnsibleFest highlights Ansible momentum as IT automation becomes an enterprise imperative
By: Date: 09/10/2020 Categories: azure

This month marks the five year anniversary since Red Hat acquired Ansible, and since then, much has changed in the IT automation world. IT organizations have always faced continual pressure to support rapid innovation at-scale, but 2020 has been an especially challenging year. Organizations required solutions that delivered fast responses to changing business requirements, and automation…

Read More →