Category: Cloud Computing

  • Azure monitoring as a data provider to your SIEM

    New capabilities for Azure monitoring allow you to ‘bring you own’ SIEM (security information and event management) and connect to Azure log and event data streams. Azure as a data provider I’d call it a landmark achievement for Azure: Enough enterprise customers are relying on Azure AD for business critical identity and security services that’s […]

  • DEEP DIVE + Azure Management PREVIEW: Office 365 Analytics

    This article shows you how to connect your Office 365 organization to an existing or new Azure Log Analytics workspace and begin to centrally monitor and alert on events occurring in your Azure AD, Exchange online and SharePoint online services. This capability for Microsoft customers can consolidate and elevate more enterprise health and security data […]

  • NEW TECH + DEEP DIVE: Microsoft Always On VPN is the DirectAccess replacement solution

    Always On VPN is a new Remote Access solution from Microsoft. It meets the needs of information workers using remote or roaming computers to access resources on the private corporate network. It’s known as “the new DirectAccess” because DirectAccess (DA) is no longer being developed. Always On VPN is simpler to deploy than DA, but […]

  • Microsoft Ignite 2018 Keynote and Favorite News

    Just attended the Microsoft Ignite 2018 Keynote presented by Microsoft CEO Satya Nadella. It’s interesting to observe the spectacle of such a large high-vis event. This year’s keynote was a departure from past years in terms of content, length, and presenters. It was an abbreviated, streamlined event that gave Satya Nadella, Microsoft CEO an exclusive […]

  • Use Azure VM Run Command Script to modify the Windows Firewall

    Situation: You have an Azure VM running Windows Server that you need to access via RDP over the Internet, and you are, per best practice, changing the well-known RDP port of 3389 to a random high-numbered port. This will significantly reduce the brute-force attempts of hackers and hostile bots to break in via RDP. Problem: […]