Today we are going to take a look at one of the Azure Identity governance preview feature lifecycle workflows.
Workflow helps a lot that a user is prepared to work when they first join the organization. They have proper access to the data, group memberships, and programs they require. By automating these three fundamental lifecycle activities Joiner ,Mover & leaver Lifecycle Workflows, a new Identity Governance service, enables companies to manage Azure AD cloud identities in a easier way.
Take a look at this video to get more information on the same.
This topic deep dives on the Azure AD B2B Collaboration and provides more information on how to get started. With B2B collaboration we can extend the collaboration beyond your organizational boundaries by putting the required controls in place
This topic will have a series of upcoming videos to get understanding on pipelines especially for IT Admins. With pipelines you can create an automated release using continuous integration pipeline and create your application. Take a look at this video as an IT admin to get started with Azure pipelines.
This video presents pull requests for collaboration and code reviews using Azure DevOps. It helps understanding how pull requests works and how to configure them.
Hope you enjoyed this video.
Feel free to subscribe to channel for getting more updates related to Microsoft Cloud Technologies.
Azure Functions is a cloud service that is accessible on demand and offers all the resources and infrastructure that are constantly updated to run your applications. Azure Function offers server less computing.
This lets the developers concentrate on the sections of the code that are most important for them and the backend underlying infrastructure is automatically taken care by the Azure in the backend.
Function App contains the execution context where the functions are hosted. Take a look at the below video for getting more information on the same.
Azure AD Identity Protection is a solution within Azure AD that provides additional capabilities for monitoring user identities and determining whether an identity has been compromised.
Take a look at the below video to know more about the overview of Azure AD Identity protection.
This video provides an overview of Guest Access in Azure AD. In Azure AD every user falls into one of the two categories Member user or Guest user. Take a look at the video for more information on the same.
Now i have entered into the devops realm will try my best to start blogging on the devops technology. Having said that this is going to be my first blog on the devops platform.
We will examine building and modifying CI/CD pipelines using Azure Devops. With that, we can create a sample code project, build a release pipeline, and lastly, after deployment, observe how the sample app is automatically distributed in complete throughout the azure cloud infrastructure.
To create a Azure Devops Project we need to navigate to Azure Devops portal and look for Devops Starter.
In the next screen we are presented with the option about what language we will be using to create this project. In our below example we are going to use .net to create this new web app.Note if we have our own code then there is an option to choose that and point them to our own Repo.
It’s been a long time since I’ve written a blog article about RBAC roles, especially in relation to Exchange. Because working in Exchange areas was my first job, I had the opportunity to have a sneak peek at this topic when a colleague suggested that we consider providing a scaled down permission level for EXO operations search and remove suspicious emails.
It’s always advisable to give the least amount of authorization for daily operational tasks, such as when an end user reports a suspicious spam email to the security team and helpdesk. There are circumstances when global admin is granted for this operation in this case, because by default there is no direct Azure AD built in roles for instance search & purge roles that is present in the compliance center.
Though there is no direct way to assign the permission via Azure AD roles we have the option to connect it to office 365 security and compliance and add this group to search & purge role. We are going to look out for providing such access via this blog.
We will use PIM to grant just-in-time access to Defender for Office 365 related tasks
In our case in this demo we are going to run this example with a user called Selvam who does not have any access apart from a regular user privilege’s. In our example Selvam will be a SOC Admin who is responsible for searching and deleting suspicious emails when an incident is reported.
The first task is to customize and add some permission entry for Selvam .
Navigate to security reader role in roles and administrator.
And go to role settings and here we need to tweak the activate maximum duration hours settings
In the next pane we can choose the role settings for example the duration hours to be 24 hours.
Its been almost a year that Microsoft has announced the new release in Azure Sentinel which provides us the opportunity to integrate MS Teams related activities that are recorded in the audit logs to Azure Sentinel. Enabling this feature benefits organization where there is a separate SOC team monitoring and analyzing the security posture as an ongoing operational procedure.
We still have the Microsoft native cloud app security which benefits in creating the alerting mechanism for MS-Teams related activities.But with the Log Analytics and Azure Sentinel we can do a lot more than it can be done from the Cloud App Security. We can further fine tune the alerting, create workbooks and dashboards for Microsoft Teams related activities which will be useful for Teams Monitoring.
To start with this new feature ,we need to enable this new option to ingest Teams Data into Azure Sentinel Work Spaces. This article can be followed to start with connecting office 365 with the Microsoft Cloud native SIEM Azure Sentinel.
I'm a Certified Microsoft Infrastructure/Cloud Architect with hands-on 14 years of International proven experience in Planning, Design, Execution, Integration, Operations, IT Management specialized in Messaging Platforms Microsoft Teams with Telephony, Skype for Business Voice, Microsoft Exchange, Intune Deployment, Microsoft Azure Infrastructure, and Cloud Security Implementations.
Over time have developed complete IT Implementation skills on Microsoft Infrastructure/Cloud projects within Multinational, Government, Construction, Leisure & Entertainment, Production, Automobile & Financial Industries.
I can be contacted through email sathish@ezcloudinfo.com or through mobile +31 62 050 6978