Azure Monitor for Cloud Workloads
Virtual machines hosted in the Azure cloud can be centrally-monitored, both Windows and Linux, using a client agent. Add the Azure Monitor […]
Virtual machines hosted in the Azure cloud can be centrally-monitored, both Windows and Linux, using a client agent. Add the Azure Monitor […]
Sensitive credentials, certificates and keys can be protected with Azure Key Vaults, which controls both the secrets and also access to them. […]
Hopefully you won’t need to restore from backup files, but picking the right level of accessibility can result in significant cost savings. […]
You may have some documents with a standard format text, like social security numbers or credit card numbers, in various folders within […]
With Azure AD Access Reviews, you can re-evaluate whether users should have continued access to resources. The tool will recommend a decision […]
If a malicious actor can find a vulnerability in your network to run their own malicious code, they can take control of […]
A network take-down can happen (before you know it) if someone got into your Active Directory environment and captured the credential of […]
The file server protocol you use matters. The WannaCry ransomware was effective due to companies’ file shares using a weak SMB protocol. […]
You might consider the internal, local network to be safe and free from malicious actors, but all it takes is one to […]