Azure services

Step-by-Step Guide to create Azure Custom VM Image

In Azure marketplace there are many different templates available for OS deployment. These are general purpose templates. But in corporate environment administrators use custom images for their OS deployments. These images are usually fine tuned for corporate requirements. Azure also allow to do the same. In Azure we can create custom images according to our requirements and use it to deploy…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra Permissions Management – Part 01 – How to onboard Azure Subscription ?

Azure services

Step-by-Step guide to Azure Point-to-Site VPN

In one of my previous article, I explain how we can create site-to-site VPN connection between local network and azure virtual network. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? we can use point-to-site method to do that. In this method it will use certificates to do the authentication between end point and…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra Permissions Management – Part 01 – How to onboard Azure Subscription ?

Azure services

Step-by-Step Guide to Azure Firewall (Preview)

When it comes to network security, we use firewalls for perimeter defense. It helps to define security boundaries for infrastructure. There are many conversations about validity of perimeter defense against modern security threats as its more about identities now. However, firewall is still the most commonly used tool to control in & out communications in a network. In Azure so far, we…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra Permissions Management – Part 01 – How to onboard Azure Subscription ?

Azure servicesMicrosoft Technologies

Step-by-Step Guide: Azure Key Vault

People use safes, security boxes to protect their valuable things. In digital world “Data” is the most valuable thing. Passwords, Connection Strings, Secrets, Data encryption/decryption keys protects access to different data sets. Whoever have access to those will also have access to data behind it (of cause they need to know how to use those ?). So how we can protect those valuable…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes