Azure Security Architect https://azuresecurityarchitect.com/ For all your cloud security needs Tue, 25 Mar 2025 17:04:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 214478653 Azure Monitor Baseline Alerts for AVDs https://azuresecurityarchitect.com/avd-azure-vdi/azure-monitor-baseline-alerts-for-avds/ https://azuresecurityarchitect.com/avd-azure-vdi/azure-monitor-baseline-alerts-for-avds/#respond Tue, 25 Mar 2025 17:04:19 +0000 https://azuresecurityarchitect.com/?p=416 Azure Monitor Baseline Alerts for AVDs – great for capturing common baseline events for AVD instances

The post Azure Monitor Baseline Alerts for AVDs appeared first on Azure Security Architect.

]]>
Azure Monitor Baseline Alerts for AVDs – great for capturing common baseline events for AVD instances

The post Azure Monitor Baseline Alerts for AVDs appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/avd-azure-vdi/azure-monitor-baseline-alerts-for-avds/feed/ 0 416
AVD Latency Issues Troubleshooting https://azuresecurityarchitect.com/avd-azure-vdi/avd-latency-issues-troubleshooting/ https://azuresecurityarchitect.com/avd-azure-vdi/avd-latency-issues-troubleshooting/#respond Fri, 14 Mar 2025 15:04:12 +0000 https://azuresecurityarchitect.com/?p=376 Azure LEvel Enable Azure Insights to capture RTT for the AVD Spin Up as well as RTT for the networking VM LEvel At the NIC level, Enable VM Accelerated Networking […]

The post AVD Latency Issues Troubleshooting appeared first on Azure Security Architect.

]]>
Azure LEvel

Enable Azure Insights to capture RTT for the AVD Spin Up as well as RTT for the networking

VM LEvel

At the NIC level, Enable VM Accelerated Networking if the VM Type (and OS) supports it

FW LEvel

Ensure that Deep Packet Filtering is not causing the latency

Ensure that  the outbound route to the internet is not causing the latency (if it is via a PA FW for example)

The post AVD Latency Issues Troubleshooting appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/avd-azure-vdi/avd-latency-issues-troubleshooting/feed/ 0 376
InTune Migration PreExisting Identities https://azuresecurityarchitect.com/intune/intune-migration-preexisting-identities/ https://azuresecurityarchitect.com/intune/intune-migration-preexisting-identities/#respond Wed, 12 Mar 2025 15:42:49 +0000 https://azuresecurityarchitect.com/?p=369 For Intune (device) migrations to be successful, two things need to be in place The identities (for those devices) need to be in place already The licensing for the devices […]

The post InTune Migration PreExisting Identities appeared first on Azure Security Architect.

]]>
For Intune (device) migrations to be successful, two things need to be in place

  1. The identities (for those devices) need to be in place already
  2. The licensing for the devices needs to be in place.

The post InTune Migration PreExisting Identities appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/intune/intune-migration-preexisting-identities/feed/ 0 369
Storage Accounts and Blob Storage https://azuresecurityarchitect.com/storage-security/storage-accounts-and-blob-storage/ https://azuresecurityarchitect.com/storage-security/storage-accounts-and-blob-storage/#respond Mon, 30 Dec 2024 17:16:49 +0000 https://azuresecurityarchitect.com/?p=320 Step 1 – Creating a NEW  STORAGE ACCOUNT Types – Storage accounts are of three types – V2 (most general purpose), V1 (hardly used anymore) and Blob Storage (can only […]

The post Storage Accounts and Blob Storage appeared first on Azure Security Architect.

]]>
Step 1 – Creating a NEW  STORAGE ACCOUNT

Types – Storage accounts are of three types – V2 (most general purpose), V1 (hardly used anymore) and Blob Storage (can only store blobs – no table storage etc).

Replication

  1. LRS (Locally redundant – always triple redundant within a datacenter)
  2. Geo Redundant
  3. Read-Access GeoRedudant

Tiers – HOT or COOL (Archive can only be set LATER)

Additional Security Options

– Bind to a VNET

Secure Transfer only

Step 2  – Adding a BLOB

Once the  storage account is ready, add a new CONTAINER (BLOB).

Access type – Private (useful for BACKUPS being stored to BLOBS), Anonymous read for BLOBS only (is the second option).

 

The post Storage Accounts and Blob Storage appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/storage-security/storage-accounts-and-blob-storage/feed/ 0 320
Azure Policy Recommended Policies https://azuresecurityarchitect.com/azure-security-ecosystem/azure-policy-recommended-policies/ https://azuresecurityarchitect.com/azure-security-ecosystem/azure-policy-recommended-policies/#respond Sun, 29 Dec 2024 16:32:53 +0000 https://azuresecurityarchitect.com/?p=318 These are the top recommended policies for most customers. Enforce resource tagging Limit allowed locations Prohibit specific resources deployment (e.g. Public IP addresses) Require Secure Transfer for Storage Accounts Block […]

The post Azure Policy Recommended Policies appeared first on Azure Security Architect.

]]>
These are the top recommended policies for most customers.

  1. Enforce resource tagging
  2. Limit allowed locations
  3. Prohibit specific resources deployment (e.g. Public IP addresses)
  4. Require Secure Transfer for Storage Accounts
  5. Block Public Access to Storage Accounts
  6. Block Anonymous access to storage accounts
  7. Configure Cosmos DB accounts to disable public network access
  8. Configure Azure SQL accounts to disable public network access

The post Azure Policy Recommended Policies appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/azure-security-ecosystem/azure-policy-recommended-policies/feed/ 0 318
Device Restrictions using Conditional Access Policies in Azure Entra ID https://azuresecurityarchitect.com/entra-id/device-restrictions-using-conditional-access-policies-in-azure-entra-id/ https://azuresecurityarchitect.com/entra-id/device-restrictions-using-conditional-access-policies-in-azure-entra-id/#respond Wed, 27 Nov 2024 18:13:19 +0000 https://azuresecurityarchitect.com/?p=270 Now, there’s a policy that allows you to restrict which devices get into your Azure subscriptions. The compliant devices policy requires you to list CIDR ranges/devices that are permitted. You […]

The post Device Restrictions using Conditional Access Policies in Azure Entra ID appeared first on Azure Security Architect.

]]>
Now, there’s a policy that allows you to restrict which devices get into your Azure subscriptions. The compliant devices policy requires you to list CIDR ranges/devices that are permitted. You can also make exceptions for specific devices if you need to.

The exact error

The portal encountered an issue while attempting to retrieve access tokens. We suggest attempting to sign in again, or alternatively, continuing without access tokens, although this may result in a suboptimal user experience. Additional details: invalid_grant: AADSTS530004: AcceptCompliantDevice setting isn’t configured for this organization. The admin needs to configure this setting to allow external users access to protected resources. Trace ID: af449c59-5668-4e01-9c12-6148328d6500 Correlation ID: e0318484-7e18-4c0f-b7a9-a678a9bc8cfd Timestamp: 2024-11-27 17:58:53Z.

The post Device Restrictions using Conditional Access Policies in Azure Entra ID appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/entra-id/device-restrictions-using-conditional-access-policies-in-azure-entra-id/feed/ 0 270
Letting in vendors to your Entra Tenant https://azuresecurityarchitect.com/entra-id/letting-in-vendors-to-your-entra-tenant/ https://azuresecurityarchitect.com/entra-id/letting-in-vendors-to-your-entra-tenant/#respond Sat, 23 Nov 2024 00:26:33 +0000 https://azuresecurityarchitect.com/?p=263 Use Case Let in a set of Vendor Engineers into your Azure Subscription (typically with GLOBAL READER permissions) Steps in Entra and in Azure Set up SSO using the vendor’s […]

The post Letting in vendors to your Entra Tenant appeared first on Azure Security Architect.

]]>
Use Case

Let in a set of Vendor Engineers into your Azure Subscription (typically with GLOBAL READER permissions)

Steps in Entra and in Azure

  1. Set up SSO using the vendor’s email id as the UUID.
  2. Grant them GUEST User licenses – into your Entra Tenant
  3. Put all these VENDOR GUESTS into a single AAD User Group.
  4. Now use RBAC to grant this user group Azure resource permissions.

The post Letting in vendors to your Entra Tenant appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/entra-id/letting-in-vendors-to-your-entra-tenant/feed/ 0 263
P2 licenses – Use Case – SSO Authentication and MFA – no mailbox https://azuresecurityarchitect.com/entra-id/licensing/p2-licenses-use-case-sso-authentication-and-mfa-no-mailbox/ https://azuresecurityarchitect.com/entra-id/licensing/p2-licenses-use-case-sso-authentication-and-mfa-no-mailbox/#respond Fri, 22 Nov 2024 20:36:46 +0000 https://azuresecurityarchitect.com/?p=257 Use Case – SSO Authentication and MFA – no mailbox P2 licenses – Cloud Only Authentication (not federated)

The post P2 licenses – Use Case – SSO Authentication and MFA – no mailbox appeared first on Azure Security Architect.

]]>
Use Case – SSO Authentication and MFA – no mailbox

P2 licenses – Cloud Only Authentication (not federated)

The post P2 licenses – Use Case – SSO Authentication and MFA – no mailbox appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/entra-id/licensing/p2-licenses-use-case-sso-authentication-and-mfa-no-mailbox/feed/ 0 257
Devices versus Apps – Managed by Intune https://azuresecurityarchitect.com/intune/devices-versus-apps-managed-by-intune/ https://azuresecurityarchitect.com/intune/devices-versus-apps-managed-by-intune/#respond Fri, 22 Nov 2024 20:36:05 +0000 https://azuresecurityarchitect.com/?p=259 Intune Can be used to manage both devices as well as applications on the devices. One can configure InTune for JUST application management (and have some other tool do the […]

The post Devices versus Apps – Managed by Intune appeared first on Azure Security Architect.

]]>
Intune

Can be used to manage both devices as well as applications on the devices.

One can configure InTune for JUST application management (and have some other tool do the device management).

The post Devices versus Apps – Managed by Intune appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/intune/devices-versus-apps-managed-by-intune/feed/ 0 259
Migration of Azure site-to-site VPN tunnel from one region to another https://azuresecurityarchitect.com/expressroute/migration-of-azure-site-to-site-vpn-tunnel-from-one-region-to-another/ https://azuresecurityarchitect.com/expressroute/migration-of-azure-site-to-site-vpn-tunnel-from-one-region-to-another/#respond Mon, 18 Nov 2024 14:14:32 +0000 https://azuresecurityarchitect.com/?p=225 Option 1 – create a new VPN in the new region Create a new VPN gateway in the desired region Configure the new gateway with the same connection settings as […]

The post Migration of Azure site-to-site VPN tunnel from one region to another appeared first on Azure Security Architect.

]]>
Option 1 – create a new VPN in the new region

Create a new VPN gateway in the desired region

Configure the new gateway with the same connection settings as the old one

and then update your on-premises VPN device to point to the new Azure gateway effectively switching the tunnel to the new region while maintaining connectivity

Most of this can be done through the Azure portal by modifying the VPN gateway’s location and connection details, ensuring your on-premises device is updated accordingly.

Option 2 – actually move the resources over (not preferred)

Entire VNet  (containing the gateway Subnet) needs to be migrated

Done using the Resource Manager migration

 

The post Migration of Azure site-to-site VPN tunnel from one region to another appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/expressroute/migration-of-azure-site-to-site-vpn-tunnel-from-one-region-to-another/feed/ 0 225