I recently tried to enable auto shutdown on a virtual machine. I wanted to receive a notification before auto-shutdown. But the option was greyed out. It would appear if send…
Cloud-Native Security and Performance: Two…
Kubernetes in a production environment, and you need to apply a patch #Kubernetes #Security #Patching #Containers Cloud-Native Security and Performance: Two... You’re running Kubernetes in a production environment, and you…
Azure – Install and Configure Antimalware On A Virtual Machine
A Virtual machine must be running. If a virtual machine is stopped your deployment will fail Note a Charge Steps to Install Extension for Microsoft Antimalware Select Virtual Machine >…
Creating Security Baselines In Microsoft Azure
Stephen Hackers Completed the Course Creating Security Baselines In Microsoft Azure By Neil Morrissey #AlwaysBeLearning #UpSkill #Azure #Security #CyberSecurity #PluralSight
Forbes: VMware Security One Of The Best Kept IT…
VMware Security- One Of The Best Kept IT Secrets & Strategy #VMware #Security #Stratergy #Roadmaps Forbes: VMware Security One Of The Best Kept IT... I recently got the chance to…
Azure – Log Analytics Workspace and AzureVirtual Machine Agent Install
How to prepare to collect security log data from your Azure Windows virtual machines. You require two things: Log Analystics Workspace to be created The agent to be installed on…
Azure – Access Control and Role Assignment
This example shows how to assign a user/group a role to admin virtual machines in a resource group. How to steps.. Select "Resource Group" > IAM > Add > Select…
Azure – Configure Management Locks – Prevent Accidental Deletion Of Core Resources
Locking prevents the accidental deletion or modifying of critical resources. Example Azure Subscription, Resource Group, Network, Files, VMs. How to configure Management locks to prevent the accidental deletion of core…
Simple SQL Injection Example – Review Security and Remediate
Something I regularly do, is review security against attacks and remediate if required. This example is a simple SQL injection attack. There is a few things in addition to code…
AZURE – Control Storage Access by Networks
We have a storage account, "StorageV2 (general purpose v2)" and its can be accessed initially from all networks. We now want to restrict the storage access to an approved network…