Author Archives: Sathish Veerapandian

Start your project planning via Azure Devops Boards

Are you interested in implementing the Devops practices but not sure what it can do for you ?

Devops has the required processes and tools for following agile practices in a very structured and easily traceable manner. Azure Boards is a tool in Azure Devops which helps Team to plan their work that needs to be done. With Azure Boards Agile Planning, Work Item Tracking and Visualization.

Take a look at the below video for getting an overview on Azure Boards.

Hope this information was helpful !

Advanced Technology Products Useful in Business Development

In today’s dynamic business environment, technology plays a more significant role in an organization’s innovations, customer experience, and overall performance. Business development, in particular, should take advantage of the latest technological advancements and tools to conduct better brand equity research, optimize sales processes, and drive business growth.

Leaders in business development must identify and deploy solutions that enable organizations to scale on demand, improve resiliency, and minimize infrastructure investments. These emerging technologies can help companies implement powerful transformations to boost revenue and stay ahead of the competition.

Continue reading

Getting started with Azure Functions

Azure Functions is a cloud service that is accessible on demand and offers all the resources and infrastructure that are constantly updated to run your applications. Azure Function offers server less computing.

This lets the developers concentrate on the sections of the code that are most important for them and the backend underlying infrastructure is automatically taken care by the Azure in the backend.

Function App contains the execution context where the functions are hosted. Take a look at the below video for getting more information on the same.

Hope you enjoyed this video !!

Overview of Azure AD Identity Protection

Azure AD Identity Protection is a solution within Azure AD that provides additional capabilities for monitoring user identities and determining whether an identity has been compromised.

Take a look at the below video to know more about the overview of Azure AD Identity protection.

Hope you enjoyed this session !

Overview of Guest Access in Azure AD

This video provides an overview of Guest Access in Azure AD. In Azure AD every user falls into one of the two categories Member user or Guest user. Take a look at the video for more information on the same.

Hope you enjoyed this video !

Regards

Sathish

Devops Starter – Launch an app running in Azure in a few quick steps

Now i have entered into the devops realm will try my best to start blogging on the devops technology. Having said that this is going to be my first blog on the devops platform.

We will examine building and modifying CI/CD pipelines using Azure Devops. With that, we can create a sample code project, build a release pipeline, and lastly, after deployment, observe how the sample app is automatically distributed in complete throughout the azure cloud infrastructure.

To create a Azure Devops Project we need to navigate to Azure Devops portal and look for Devops Starter.

In the next screen we are presented with the option about what language we will be using to create this project. In our below example we are going to use .net to create this new web app.Note if we have our own code then there is an option to choose that and point them to our own Repo.

Continue reading

Utilize Intune endpoint security policies for Account Protection in Windows devices

Microsoft has invested a lot of new upgrades in end point security in the last few of years. We can use Intune endpoint security policies for account protection to safeguard users’ identities and accounts, as well as control device built-in group memberships. In the end point security policies we can do the account protection and we will have a look at the settings in this article

To get started navigate to endpoint security and click on account protection. Here we have the opportunity to create an account protection policy.

When creating the new policy at the time of writing this blog we have option to create the policy for the platform Windows 10 and later. And the profile is targeted for two profiles local user group membership or account protection which is in preview state at this moment.

When creating for local user group we have the below options where we can select administrators and other set of user groups as we see below.

Continue reading

The Power of Data Analytics in Growing Your Business

Data is everywhere in today’s world, and businesses are collecting it at an unprecedented rate. And while most companies understand the value of this data, they often don’t know how to harness it to its full potential. That’s a critical part of your responsibilities as a business manager. Understanding your data can help you use it to make decisions about your business. Keep reading to learn more about how data analytics can help your business grow, courtesy of EzCloudInfo.

What Is Data Analytics?

Data analytics is turning data into insights that can help your business make better decisions. By analyzing your data, you can gain insights into your customers, operations, and competition. You can also use data analytics to understand which marketing campaigns work and manage your inventory more effectively. All of these areas of your business can be evaluated through the process of task mining. The data your business creates can be used to refine your operations, saving you both time and money.

Continue reading

Azure PIM- Create custom RBAC roles for search & delete emails

It’s been a long time since I’ve written a blog article about RBAC roles, especially in relation to Exchange. Because working in Exchange areas was my first job, I had the opportunity to have a sneak peek at this topic when a colleague suggested that we consider providing a scaled down permission level for EXO operations search and remove suspicious emails.

It’s always advisable to give the least amount of authorization for daily operational tasks, such as when an end user reports a suspicious spam email to the security team and helpdesk. There are circumstances when global admin is granted for this operation in this case, because by default there is no direct Azure AD built in roles for instance search & purge roles that is present in the compliance center.

Though there is no direct way to assign the permission via Azure AD roles we have the option to connect it to office 365 security and compliance and add this group to search & purge role. We are going to look out for providing such access via this blog.

We will use PIM to grant just-in-time access to Defender for Office 365 related tasks

In our case in this demo we are going to run this example with a user called Selvam who does not have any access apart from a regular user privilege’s. In our example Selvam will be a SOC Admin who is responsible for searching and deleting suspicious emails when an incident is reported.

The first task is to customize and add some permission entry for Selvam .

Navigate to security reader role in roles and administrator.

And go to role settings and here we need to tweak the activate maximum duration hours settings

In the next pane we can choose the role settings for example the duration hours to be 24 hours.

Continue reading

Microsoft Teams – Create approvals from work flows to Automate Tasks or repetitive processes

Teams is a fantastic Solution where it provides opportunity to collaborate and communicate effectively. It makes it more powerful when we utilize the full features of the Teams. For instance ,when we utilize the power platform to automate the recurring tasks, repetitive processes for end users the Teams can become really useful.

In this blog lets look at one example where as an end user we can utilize Microsoft Teams for automating our daily recurring tasks via the new feature released recently with WorkFlows

To get started with in the Teams Client navigate to apps – choose work flows and select the category of your choice. In our example we are going to pick one used case of Approval of a change request when a new change is submitted in the SharePoint List.

In the next screen we will be notified with the below window where we will be notified that all the below apps must have the valid connection for them to work further.

Continue reading
%d bloggers like this: