A centralized identity provider is particularly useful for applications with global users who do not…
Read MoreAuthor: admin
What is the difference between Microsoft CAF and WAF, and which one should I adopt?
Azure ArchitectureWhile Azure’s WAF targets specific workloads and instructs at the workload level to validate which…
Read MoreFree DDoS protection for Azure Firewall and when should I buy DDoS Plan
Security and ComplianceIn summary, if your environment has no ingress and the only resources in the DDoS…
Read MoreWhy Organization moving away from phone-based MFA
Azure Entra, Security and ComplianceMost of the organizations including Microsoft are urging users to replace telephone-based multi-factor authentication (MFA)…
Read MoreAzure AD vs Microsoft AD vs Active directory Federation services (ADFS)
Azure Entra, Security and ComplianceAzure AD(AAD) has been renamed Microsoft Entra ID, but I will continue to use Azure…
Read MoreAzure Virtual Machine (VM) Agents
Azure best practicesThe core functionality from a workload perspective is generally built into the operating system (OS)…
Read MoreThe top 8 best practices for an optimal Log Analytics workspace design:
Azure best practices, LoggingAzure Log analytics best practices Choosing the right technical design versus the right licensing model…
Read More