Role-based access control (RBAC) and attribute-based access control (ABAC) are two ways of controlling the authentication…
Read MoreToken Protection with Azure AD/ Entra ID
Azure Entra, Security and ComplianceA centralized identity provider is particularly useful for applications with global users who do not…
Read MoreWhat is the difference between Microsoft CAF and WAF, and which one should I adopt?
Azure ArchitectureWhile Azure’s WAF targets specific workloads and instructs at the workload level to validate which…
Read MoreFree DDoS protection for Azure Firewall and when should I buy DDoS Plan
Security and ComplianceIn summary, if your environment has no ingress and the only resources in the DDoS…
Read MoreWhy Organization moving away from phone-based MFA
Azure Entra, Security and ComplianceMost of the organizations including Microsoft are urging users to replace telephone-based multi-factor authentication (MFA)…
Read MoreAzure AD vs Microsoft AD vs Active directory Federation services (ADFS)
Azure Entra, Security and ComplianceAzure AD(AAD) has been renamed Microsoft Entra ID, but I will continue to use Azure…
Read MoreAzure Virtual Machine (VM) Agents
Azure best practicesThe core functionality from a workload perspective is generally built into the operating system (OS)…
Read MoreThe top 8 best practices for an optimal Log Analytics workspace design:
Azure best practices, LoggingAzure Log analytics best practices Choosing the right technical design versus the right licensing model…
Read More