Azure services

How to replicate encrypted Azure VM to a secondary Azure Region?

In my previous post, I have explained how we can replicate Azure VM to a secondary Azure region, But what if we need to replicate an encrypted Azure VM? Azure VM encryption uses the Azure Key Vault to store encryption keys and secrets. If we are replicating encrypted Azure VM, we also need to copy encryption keys to the target region. In this demo, I am going to demonstrate how we can replicate…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra Permissions Management – Part 01 – How to onboard Azure Subscription ?

Azure servicesMicrosoft Entra ID

Step-by-Step Guide to Encrypt Azure Linux VM (PowerShell Guide)

Disk encryption is a basic data protection method for physical & virtual hard disks. In one of my previous posts, I explained how we can encrypt Azure Windows VM using Azure Key Vault & BitLocker. This post can access via http://www.rebeladmin.com/2019/09/step-step-guide-encrypt-azure-windows-vm-using-bitlocker-powershell-guide/ . Similarly, we also can encrypt Azure Linux VM by using…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?

Azure services

Step-by-Step Guide to Encrypt Azure Windows VM using BitLocker (PowerShell Guide)

Disk encryption is a basic data protection method for physical & virtual hard disks. It falls under physical data security and it prevents data breaches from stolen hard disks (physical & virtual). If it is a Windows machine, we can simply use BitLocker for disk encryption. Also, there are other third-party vendors such as Thales e-Security which provides disk encryption solutions for…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra Permissions Management – Part 01 – How to onboard Azure Subscription ?

Azure servicesMicrosoft Technologies

Step-by-Step Guide: Azure Key Vault

People use safes, security boxes to protect their valuable things. In digital world “Data” is the most valuable thing. Passwords, Connection Strings, Secrets, Data encryption/decryption keys protects access to different data sets. Whoever have access to those will also have access to data behind it (of cause they need to know how to use those ?). So how we can protect those valuable…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?