Azure | Deploy Azure Virtual Desktop
Reading Time: 6 minutesUsing Azure Virtual Desktop as a replacement for Microsoft Remote Desktop Services. Get to know how to setup and the benefits about the new CLOUD solution.
Reading Time: 6 minutesUsing Azure Virtual Desktop as a replacement for Microsoft Remote Desktop Services. Get to know how to setup and the benefits about the new CLOUD solution.
Reading Time: 4 minutesSecure email transmission is vital for everyone, and MTA-STS is here to solve the problem. Learn what MTA-STS is, how it works, and why domain should implement it now!
Reading Time: 5 minutesDMARC (Domain-based Message Authentication, Reporting, and Conformance) is a method of email authentication that builds upon the DKIM and SPF (Sender Policy Framework) protocols. DMARC allows domain owners to publish a policy in their DNS records that instructs email servers how to handle email messages that fail DKIM or SPF checks.
Reading Time: 6 minutesDKIM (DomainKeys Identified Mail) is a method of email authentication that uses public key cryptography to verify that an email message was sent by the legitimate sender and has not been modified in transit.
Reading Time: 2 minutesSPF (Sender Policy Framework) records is a standard to help your battle against spam. It is an email authentication standard that protects senders and recipients from spam, spoofing and phishing. By adding this record to your domain, you will provide a list of senders that are approved to send e-mail from your domain.
Reading Time: 2 minutesGraph API will only result the first 999 results with an odata.nextlink parameter. In this function we will use this parameter to add the rest of the “next page” untill all is retrieved.
Reading Time: 5 minutesBefore we used Terraform to deploy virtual machines with needed resources to Azure. Now we are using Terraform to accomplish the same to AWS. A Blogpost about the ins and outs.
Reading Time: 5 minutesBefore we used Azure Bicep to deploy virtual machines with needed resources to Azure. Now we are using Terraform to accomplish the same. A Blogpost about the ins and outs.
Reading Time: 8 minutesUsing Azure Bicep will give you the the control of deployment of resources in Azure. Every time deploying the bicep will check if the desired state still is available or needs to be changed. Using it in a DevOps Pipeline is great for continuous deployment.
Reading Time: 3 minutesIn this part we are going to get all RBAC roles for Azure Active Directory and their members. Some identities are Eligible and some are Active. An overview of the status is needed to see if there is no legacy permissions assigned.
Reading Time: 5 minutesIn this part we will get an export of the Conditional Access Policies and App Regsitrations and Enterprise Applications with there API permissions. Also the client secret or certificate information will be exported to get a good sight on it.
Reading Time: 2 minutesIn this part we will take a look how to retrieve the licenses and organization information. We are going to use this information to write a small report at the end of the assessment.
Cookie name | Active |
---|