How to launch Azure Automation Runbooks using a webhook requestsing a single http request , a webhook enables an external service to launch a specific runbook in Azure. Take a look at this video on getting started with this approach.
Author Archives: Sathish Veerapandian
Azure AD – End user FIDO Security key sign-in and experience
Since I’ve been doing vlogs in my Youtube Channel for the past 10 months, it’s been a while since I last blogged. Today, I made the decision to blog about the procedures for using the Office 365 Apps’ password-free FIDO secure sign-in.
Today we will take a look at how to setup the Passwordless sign-in via FIDO Key from the end user perspective.
In this example we are going to use Fietian FIDO2 certified key in this demo. You can take a look at their products from their website
You can also take a look at the available FIDO key security providers and Fietian is one of them in the Microsoft Docs websiteContinue reading
Azure Desired state configuration how to get started
Use Azure Automation state configuration report only endpoint if you’re not ready to manage the virtual machines. This functionality enables you to view reporting details in Azure Automation and set push configurations through DSC.
Hope you enjoyed this video !!
Extending passwordless authentication to OnPremise Applications via Azure
This video explains about how to utilize FIDO key in your environment for passwordless authentication and steps to extend this passwordless functionality to onpremise environment by using Azure AD We have used Yubico FIDO key for this Demo.
Hope you enjoyed this video !!
9 Innovative Ways Cloud Technology Can Elevate HR Management
Cloud technology has revolutionized how businesses operate by allowing them to store data and applications off-site, freeing up space on local servers. This shift has also made cloud technology a more affordable option for businesses of all sizes.
When it comes to human resources management, cloud technology’s impact is twofold.
First, cloud-based HR software allows managers to access employee files from any device with an internet connection, making it easy to track and monitor employee performance in real time.
Second, cloud storage makes it easy to back up employee files and protect against data loss in case of a system crash or natural disaster.Continue reading
Azure AD – Getting started with Passwordless Authentication
For enterprises that use passwords today banned password list, block reused passwords, stop predictable passwords with strong MFA are the security measures and enforcements. However when you have a shared PC environment for few business cases password less authentication mechanism via FIDO keys provides a better security to the IT Infrastructure. Passwordless authentication methods are more convenient because the password is removed and can be replaced with biometrics.
This video focuses on enabling security key based passwordless authentication and seeing the example via Microsoft Authenticator.
Hope you enjoyed this video !
Identify legacy authentication utilization in your tenant
It is important to note the every organization should block legacy authentication to improve security posture since MFA is not supported for legacy authentication clients.
Take a look at this vide to see what are the steps we can use to identify the legacy authentication utilization in your Azure AD tenant.
Starting with Advanced Hunting in Microsoft 365 Defender
A query based threat hunting tool Advanced hunting in Microsoft 365 Defender gives us access up to analyze data of 30 days. This will help to find threat signs , proactively examine network events for both known and unknown threats.This will help to identify, investigate and respond threats.
Take a look at this video to get more information on the same.
Microsoft Sentinel – Getting started with Automation Rules and Playbooks to help automate threat response
Microsoft Sentinel’s automation rules give you the ability to develop and organize rules that can be used in a variety of scenarios, allowing you to manage automation from a central location. A playbook is a compilation of various corrective actions that may be routinely executed from Microsoft Sentinel.
When triggered by specific alerts or incidents, as determined by an analytics rule or an automation rule, a playbook can help automate and orchestrate your threat response. It can be used manually or set to run automatically in response to specific alerts or incidents.
Take a look at this video on getting started with Automation Rules & Playbooks
Azure Sentinel – Use of Microsoft Sentinel Analytics Rules & Data Connectors to detect potential threats
Enterprise-wide threat information and intelligent security analytics are provided by Microsoft Sentinel. A single solution for attack detection, threat visibility, proactive hunting, and threat response with Microsoft Sentinel.
Microsoft Sentinel Analytics provides an intelligent solution that you can use to detect potential threats and vulnerabilities in your organizations.
Microsoft Sentinel Analytics helps you detect, investigate, and remediate cybersecurity threats.
Additionally, Microsoft Sentinel includes built-in worksheet templates so that as soon as a data source is connected, you may instantly acquire insights from your data.
Take a look at this video !