Power of the cloud - Introduction to azure securityBruno Capuano
Slides used during the session
Introduction to Microsoft Azure Security
Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This presentation helps you understand how Azure security capabilities can help you fulfill these requirements using options such as Azure AD, Azure Security Center, Azure Advisor, and Azure Monitor.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
here's where Microsoft has invested, across these areas: identity and access management, apps and data security, network security, threat protection, and security management.
We’ve put a tremendous amount of investment into these areas and the way it shows up is across a pretty broad array of product areas and features.
Our Identity and Access Management tools enable you to take an identity-based approach to security, and establish truly conditional access policies
Our App and Data Security help you protect your apps and your data as it moves around—both inside and outside your organization
Azure includes a robust networking infrastructure with built-in security controls for your application and service connectivity.
Our Threat Protection capabilities are built in and fully integrated, so you can strengthen both pre-breach protection with deep capabilities across e-mail, collaboration services, and end points including hardware based protection; and post-breach detection that includes memory and kernel based protection and response with automation.
And our Security Management tools give you the visibility and more importantly the guidance to manage policy centrally
Power of the cloud - Introduction to azure securityBruno Capuano
Slides used during the session
Introduction to Microsoft Azure Security
Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This presentation helps you understand how Azure security capabilities can help you fulfill these requirements using options such as Azure AD, Azure Security Center, Azure Advisor, and Azure Monitor.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
here's where Microsoft has invested, across these areas: identity and access management, apps and data security, network security, threat protection, and security management.
We’ve put a tremendous amount of investment into these areas and the way it shows up is across a pretty broad array of product areas and features.
Our Identity and Access Management tools enable you to take an identity-based approach to security, and establish truly conditional access policies
Our App and Data Security help you protect your apps and your data as it moves around—both inside and outside your organization
Azure includes a robust networking infrastructure with built-in security controls for your application and service connectivity.
Our Threat Protection capabilities are built in and fully integrated, so you can strengthen both pre-breach protection with deep capabilities across e-mail, collaboration services, and end points including hardware based protection; and post-breach detection that includes memory and kernel based protection and response with automation.
And our Security Management tools give you the visibility and more importantly the guidance to manage policy centrally
One of the major concerns for most organizations considering cloud services is security in the cloud. Are you looking to secure your cloud environment or services, no matter what they may be – data, operating system, domain or applications from intrusion and vulnerabilities? Azure Active Directory is Microsoft's multi-tenant, cloud-based directory, and identity management service helping secure your cloud and on-premise environments.
In this presentation, we discussed Azure Active Directory (Azure AD) Identity Protection, Conditional Access, Identity Management which uses AI and machine learning capabilities to help secure your cloud environment – Office 365 and Azure. In this session, we discussed
Advanced features of Azure AD
Demonstrate the detection capabilities, and real-time prevention
Part 01: Azure Virtual Networks – An OverviewNeeraj Kumar
A virtual network in Azure is similar to the network that we have in our on-premises environment, helping us connect different resources. The azure network helps us connect virtual machines (VMs), create a connected system as a part of a FARMs so that they can communicate with each other, and talk to the on-premises systems as well in special connected scenarios.
This is the Part 1 of the Azure Virtual Networking Servies and is the part of the AZ-100 certification examination, and it provides an overview of the vNet, and the components of the virtual network that an Azure Administrator has to deal with on a daily basis.
CCI2018 - Azure Network - Security Best Practiceswalk2talk srl
Nell'era moderna del cloud computing, la tendenza è di spostare sempre più frequentemente i propri workload nel cloud pubblico e di utilizzare cloud ibridi. La sicurezza è spesso un elemento inibitore per l’utilizzo di ambienti cloud. Come è possibile strutturare la topologia di rete in presenza di ambienti cloud e renderla sicura ? Si può estendere il proprio datacenter nel cloud mantenendo un elevato livello di sicurezza della rete ? Come garantire un accesso sicuro ai servizi presenti nel cloud e con quali strumenti ? Una delle principali ragioni per utilizzare Azure per le proprie applicazioni e i propri servizi è data proprio dalla possibilità di poter usufruire di un ampio set di funzionalità e di strumenti di sicurezza integrati nella platform. In questa sessione saranno presentate le security best practices in ambito network nel mondo Azure, date da un'esperienza diretta sul campo. Affrontando scenari reali saranno riportate le linee guida e gli accorgimenti utili per utilizzare al meglio le potenzialità presenti nella piattaforma, al fine di strutturare il network in Azure rispettando tutti i principi di sicurezza.
By Francesco Molfese
Full stack monitoring across apps & infrastructure with Azure MonitorSquared Up
Azure Thames Valley is a group for anyone interested in Microsoft Azure Cloud Computing Platform and Services. We aim to provide the whole Microsoft Azure community, whatever their level, with a regular meeting place to share knowledge, ideas, experiences, real-life problems, best working practices and many more from their own past experiences. Professionals across various disciplines including Developers, Testers, Architects, Project Managers, Scrum Masters, CTOs and many more are all welcome.
Presentation: A look into Azure Monitoring solutions, with Clive Watson
Azure Monitoring solutions include some great insights into your Cloud & Hybrid services and applications. Do you want to learn more about the technologies, setup and usage? We will take a look at Azure Monitor and Log Analytics and supporting services in this talk and demo.
Clive has over 30 years’ experience within the industry (14+ at Microsoft), currently he is an Azure Infrastructure Specialist for Microsoft based in the UK.
Azure Role Based Access Control with an use case and explanation about various concepts like Global Administrators, Role Assignments, Account Administrators, Azure Roles, Custom Roles for both Azure AD and Azure Subscriptions
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Building an Enterprise-Grade Azure Governance ModelKarl Ots
As presented at the CloudBrew 2019 conference in 13.12.2019.
When proper governance model is followed, your Azure application development teams are operating in a secure and compliant Azure environment during design, development and operations. In this "lessons learned" type of session, Karl will will share practical tips on how to build a comprehensive Azure governance model, based on real-life experiences from working with multi-billion dollar corporations.
After this session, you should have a better understanding of Azure governance best practices and in-house team roles & responsibilities. You will also have an overview of the technical fundamentals of a comprehensive Azure Governance.
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...Edureka!
** Microsoft Azure Certification Training: https://www.edureka.co/microsoft-azure-training**
This Edureka "Azure Active Directory” tutorial will give you a thorough and insightful overview of Microsoft Azure Active Directory and help you understand other related terms like Tenants, Domain services etc. Following are the offerings of this tutorial:
1. What is Azure Active Directory?
2. Azure AD vs Windows AD
3. Azure AD Audience
4. Azure AD Editions
5. Azure AD Tenants
6. Demo-Creating and using Active Directory
Check out our Playlists: https://goo.gl/A1CJjM
One of the major concerns for most organizations considering cloud services is security in the cloud. Are you looking to secure your cloud environment or services, no matter what they may be – data, operating system, domain or applications from intrusion and vulnerabilities? Azure Active Directory is Microsoft's multi-tenant, cloud-based directory, and identity management service helping secure your cloud and on-premise environments.
In this presentation, we discussed Azure Active Directory (Azure AD) Identity Protection, Conditional Access, Identity Management which uses AI and machine learning capabilities to help secure your cloud environment – Office 365 and Azure. In this session, we discussed
Advanced features of Azure AD
Demonstrate the detection capabilities, and real-time prevention
Part 01: Azure Virtual Networks – An OverviewNeeraj Kumar
A virtual network in Azure is similar to the network that we have in our on-premises environment, helping us connect different resources. The azure network helps us connect virtual machines (VMs), create a connected system as a part of a FARMs so that they can communicate with each other, and talk to the on-premises systems as well in special connected scenarios.
This is the Part 1 of the Azure Virtual Networking Servies and is the part of the AZ-100 certification examination, and it provides an overview of the vNet, and the components of the virtual network that an Azure Administrator has to deal with on a daily basis.
CCI2018 - Azure Network - Security Best Practiceswalk2talk srl
Nell'era moderna del cloud computing, la tendenza è di spostare sempre più frequentemente i propri workload nel cloud pubblico e di utilizzare cloud ibridi. La sicurezza è spesso un elemento inibitore per l’utilizzo di ambienti cloud. Come è possibile strutturare la topologia di rete in presenza di ambienti cloud e renderla sicura ? Si può estendere il proprio datacenter nel cloud mantenendo un elevato livello di sicurezza della rete ? Come garantire un accesso sicuro ai servizi presenti nel cloud e con quali strumenti ? Una delle principali ragioni per utilizzare Azure per le proprie applicazioni e i propri servizi è data proprio dalla possibilità di poter usufruire di un ampio set di funzionalità e di strumenti di sicurezza integrati nella platform. In questa sessione saranno presentate le security best practices in ambito network nel mondo Azure, date da un'esperienza diretta sul campo. Affrontando scenari reali saranno riportate le linee guida e gli accorgimenti utili per utilizzare al meglio le potenzialità presenti nella piattaforma, al fine di strutturare il network in Azure rispettando tutti i principi di sicurezza.
By Francesco Molfese
Full stack monitoring across apps & infrastructure with Azure MonitorSquared Up
Azure Thames Valley is a group for anyone interested in Microsoft Azure Cloud Computing Platform and Services. We aim to provide the whole Microsoft Azure community, whatever their level, with a regular meeting place to share knowledge, ideas, experiences, real-life problems, best working practices and many more from their own past experiences. Professionals across various disciplines including Developers, Testers, Architects, Project Managers, Scrum Masters, CTOs and many more are all welcome.
Presentation: A look into Azure Monitoring solutions, with Clive Watson
Azure Monitoring solutions include some great insights into your Cloud & Hybrid services and applications. Do you want to learn more about the technologies, setup and usage? We will take a look at Azure Monitor and Log Analytics and supporting services in this talk and demo.
Clive has over 30 years’ experience within the industry (14+ at Microsoft), currently he is an Azure Infrastructure Specialist for Microsoft based in the UK.
Azure Role Based Access Control with an use case and explanation about various concepts like Global Administrators, Role Assignments, Account Administrators, Azure Roles, Custom Roles for both Azure AD and Azure Subscriptions
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Building an Enterprise-Grade Azure Governance ModelKarl Ots
As presented at the CloudBrew 2019 conference in 13.12.2019.
When proper governance model is followed, your Azure application development teams are operating in a secure and compliant Azure environment during design, development and operations. In this "lessons learned" type of session, Karl will will share practical tips on how to build a comprehensive Azure governance model, based on real-life experiences from working with multi-billion dollar corporations.
After this session, you should have a better understanding of Azure governance best practices and in-house team roles & responsibilities. You will also have an overview of the technical fundamentals of a comprehensive Azure Governance.
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...Edureka!
** Microsoft Azure Certification Training: https://www.edureka.co/microsoft-azure-training**
This Edureka "Azure Active Directory” tutorial will give you a thorough and insightful overview of Microsoft Azure Active Directory and help you understand other related terms like Tenants, Domain services etc. Following are the offerings of this tutorial:
1. What is Azure Active Directory?
2. Azure AD vs Windows AD
3. Azure AD Audience
4. Azure AD Editions
5. Azure AD Tenants
6. Demo-Creating and using Active Directory
Check out our Playlists: https://goo.gl/A1CJjM
An overview of Whats New in VMware vRealize Network Insight 3.4. vRealize Network Insight provides micro-segmentation planning, 360 visibility and troubleshooting and VMware NSX day 2 operations management.
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023VMware Tanzu
Event Slides: Simplify and Scale Enterprise Spring Apps in the Cloud
Date: March 23, 2023
Speakers:
Adib Saikali, Principal Solutions Engineer, VMware Tanzu
Asir Selvasingh, Principal Architect, Java on Azure, Microsoft
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
Availability of cloud computing is helping Financial Services organizations realize accelerated go-to-market speeds, global scalability, and cost efficiencies. This new world forces considerations for security programs – what is different in the cloud and what do I do differently? AWS Security Architects will share protocols that need to be considered in the cloud, on premises, or in a hybrid model. They will also share best practices, lessons learned, efficiencies, and design patterns and architectures unique to cloud.
Eric Golpe. Security, privacy, and compliance concerns can be significant hurdles to cloud adoption. Azure can help customers move to the cloud with confidence by providing a trusted foundation, demonstrating compliance with security standards, and making strong commitments to safeguard the privacy of customer data. This presentation will educate you in the fundamentals of Azure security as they pertain to the Cortana Analytics Suite, including capabilities in place for threat defense, network security, access control, and data protection as well as data privacy and compliance. Go to https://channel9.msdn.com/ to find the recording of this session.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...Amazon Web Services
The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. In this session, we’ll provide a practical understanding of the assurance programs that AWS provides; such as HIPAA, FedRAMP(SM), PCI DSS Level 1, MPAA, and many others. We’ll also address the types of business solutions that these certifications enable you to deploy on the AWS Cloud, as well as the tools and services AWS makes available to customers to secure and manage their resources.
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...Cisco Canada
Initial hyperconverged solutions brought new levels of IT simplicity, as well as the associated speed. However, quickly increasing simplicity came at a price and design trade-offs were made limiting infrastructure agility, efficiency, and adaptability.
Introducing Cisco HyperFlex Systems, complete hyperconvergence that unifies Cisco networking and computing technology with the next-generation Cisco HX Data Platform. Powered by the Cisco Unified Computing System (Cisco UCS) platform, Cisco HyperFlex solutions deliver new levels of operational efficiency and adaptability to more workloads and applications. Cisco HyperFlex technology answers the operations requirements for agility, scalability, and pay-as-you-grow economics of the cloud—but with the benefits of on-premises infrastructure.
Agenda:
• New innovations to the Cisco data center portfolio
• Introducing Cisco HyperFlex Systems powered by the Cisco UCS platform
• Deep dive into the Cisco HyperFlex HX Data Platform
• Preview early deployments of Cisco HyperFlex Systems
What's New In Microsoft System Center 2016 & OMSAsaf Nakash
In this presentation, we will cover the latest feature of Microsoft System Center 2016 as well as cover the operation management suite and how connecting it to the organization will help you having insight in your environment.
Webinar Fondazione CRUI e VMware: VMware vRealize SuiteJürgen Ambrosi
vRealize Suite è una piattaforma di Cloud Management di classe enterprise progettata appositamente per il cloud ibrido che consente di distribuire e gestire rapidamente l’infrastruttura e le applicazioni senza compromettere il controllo IT.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
16. You need all three
High availability
When your applications
have a catastrophic failure,
run a second instance
Disaster recovery
When your applications have a
catastrophic failure, run them in
Azure or a secondary datacenter
Backup
When your data is corrupted,
deleted or lost you can restore it
21. Desired State Configuration (DSC)
- Proactively respond to configuration
drift by defining a baseline for your
environment
- Deliver Infrastructure as code
- Flexible Delivery
• Apply and monitor
• Apply and autocorrect
- Detailed reporting and diagnostics at a
per resource level
- Available for both Windows & Linux
Change Tracking & Inventory
- Track changes made to your system
- Valuable for root-cause analysis
- Collect & search inventory and history
- Available for both Windows & Linux
- Windows
• Software
• Services
• Files
• Registry
- Linux
• Software (Packages)
• Daemons
• Files
Key Features
Configure any cloud or on
premise machine
Windows & Linux
Desired State Configuration
Change Tracking
Inventory
On-
Premises
Datacenter
Azure
AWS &
Service
Providers
22. View snapshots for:
• Software
• Files
• Daemons/services
• Registry values
Key Features:
• Spans across Windows & Linux
• Use data to create computer
groups
• Browse historical data
23.
24. View changes for:
• Software
• Files
• daemons/services
• registry values
• Azure activity log (New*)
Scenarios:
• Identify unauthorized changes
• Correlate configuration changes with
monitoring events
• Create an alert & remediate on change
• Reporting for package/software updates
• Browse historical changes for diagnosis and
forensics
25.
26. Automated configuration management from the cloud
• Manage physical hosts and VMs in any cloud or on-premises
• Windows or Linux
• Configuration setting and reporting
• Easily attach Azure VMs from portal, ARM Template, or extension
Powered by PowerShell DSC
PowerShell (PS) DSC configuration, node configuration (MOF), node, and
resource management
• Import configurations & modules (from PS Gallery or custom)
• Author
• Compile
• Distribute to nodes
• View granular and high-level configuration compliance reports
• Easy node onboarding
Deploy, enforce, and monitor configuration compliance
38. Monitoring and Logging
AZURE:
• Performs monitoring & alerting of security
events for the platform
• Enables security data collection via
Monitoring Agent or Windows Event
Forwarding
CUSTOMER:
• Configures monitoring
• Exports events to SQL Database,
HDInsight or a SIEM for analysis
• Monitors alerts & reports
• Responds to incidents
Azure
Storage
Customer
Admin
Guest VM Cloud Services
Customer VMs
Portal
Smart API
Guest VM
Enable Monitoring Agent
Events
Extract event information to SIEM or
other Reporting System
Event ID Computer Event Description Severity DateTime
1150 Machine1 Example security event
4 04/29/2014
2002 Machine2 Signature Updated Successfully
4 04/29/2014
5007 Machine3 Configuration Applied
4 04/29/2014
1116 Machine2 Example security event
1 04/29/2014
1117 Machine2 Access attempted
1 04/29/2014
SIEM Admin View
Alerting & reporting
HDInsight
Microsoft Azure
https://www.microsoft.com/en-us/trustcenter/security/auditingandlogging
39. Full Stack Monitoring & Analytics across Apps and Infra
Application Insights
Scenario Specific Monitoring – Customized Data Ingestion & Diagnostics
Log Analytics
Service Map Container Health
…Network Performance Monitor
Monitoring Fundamentals – Available out of the box with Azure Platform
Activity LogsDiagnostic Logs Service HealthMetrics
Dashboards Alerts Action Groups Autoscale
Unified pricing model
Only pay what you use
Data ingestion per GB
41. • Diagnosing across app stack is
hard unless various
perspectives connected
• New and powerful big data
query engine for all your app
telemetry and root-cause
analysis
• Ad-hoc queries and full-text
search helps answer tough
questions instantly
42. • Simple, powerful SQL like language
much easier for complex queries
• Filter, join and correlate data to gain
performance & usage insights
• Extract and extend your data to
create new calculated data fields
• Generate statistical aggregations
and powerful visualizations instantly
44. • Open Source SDKs to power
insights for any web app
• Continuously export data to
Azure Blob Storage or SQL
• Visualize data with Power BI
Content Pack
• Data access via REST APIs*
Editor's Notes
25% of VMs on Azure are already using Azure Backup.
Only 10% are secure!
Only 10% are monitored
Azure can help by reducing the challenges of cost and complexity, while helping add coverage and compliance. Let’s drill into more details.
Microsoft Azure provides customers peace of mind knowing their workloads are protected from any disaster without having to build and maintain a secondary datacenter or relying on backup. Azure delivers cloud services that extend to your datacenter to protect your infrastructure, transforming your business with a true hybrid solution.
Reducing costs
Customers do not have to pay for infrastructure, the power to run and cool machines, or IT personnel to manage machines, saving customers from paying to maintain a secondary data center
Managing complexity
Customers can leverage automation to enable the true power of recovery plans and allow you to failover your workloads with a click of a button, removing the guest work and stress involved in a disaster
Ensuring compliance
Disaster recovery is no longer constrained by geographical barriers. The disaster recovery site can be from any one of our Azure regions around the world. (Or asking for something like the quick restoration of workloads allows customers to gather necessary information to meet compliance deadlines)
Scaling protection
ASR provides rich capabilities to quickly replicate virtual and physical machines a customer’s own secondary on-premises site or Azure
Azure can help by reducing the challenges of cost and complexity, while helping add coverage and compliance. Let’s drill into more details.
Microsoft Azure provides customers peace of mind knowing their workloads are protected from any disaster without having to build and maintain a secondary datacenter or relying on backup. Azure delivers cloud services that extend to your datacenter to protect your infrastructure, transforming your business with a true hybrid solution.
Reducing costs
Customers do not have to pay for infrastructure, the power to run and cool machines, or IT personnel to manage machines, saving customers from paying to maintain a secondary data center
Managing complexity
Customers can leverage automation to enable the true power of recovery plans and allow you to failover your workloads with a click of a button, removing the guest work and stress involved in a disaster
Ensuring compliance
Disaster recovery is no longer constrained by geographical barriers. The disaster recovery site can be from any one of our Azure regions around the world. (Or asking for something like the quick restoration of workloads allows customers to gather necessary information to meet compliance deadlines)
Scaling protection
ASR provides rich capabilities to quickly replicate virtual and physical machines a customer’s own secondary on-premises site or Azure
Gain visibility into health, performance and utilization of your platform, apps, and workloads, no matter where they reside and get time back to focus on the initiatives that matter the most to you and your organization.
Azure provides monitoring and analytics as a SaaS offering, so you can get started quickly without any infrastructure overhead. It is designed to manage your development and IT operations workflows through a unified experience. It can connect to any data source and leverage your existing management tools, both on-premises and in the cloud. You will bridge the gap between app and infrastructure with the automated discovery and mapping of the dependencies across servers, processes, and 3rd party services. You can query at cloud scale and gain immediate insight by correlating and analyzing petabytes of machine data. With built-in solutions and machine learning algorithms baked into the service, you can detect and fix issues, before it impacts users - no matter what type of platform, or which public cloud service you use.
Key benefits
Collect and correlate data from multiple sources, enabling integrated monitoring and diagnostics of the cloud and on-premises environment, across multi-vendor solutions
Discover application components and map their connections across servers, processes, and ports, for complete visibility of multi-tier services
Visualize and alert on the health, performance and utilization of your resources, no matter where they reside and accelerate troubleshooting of issues
Detect and respond to issues before they impact your users, with continuous monitoring across development and IT operations workflows.
Learn, iterate, and improve the performance and usability of your apps and services using real-time insights with machine learning and ad-hoc analytics
Talk through the investments of what MSFT/Azure sees as important for enterprise cloud management platform
The combination together is powerful. Truly integrated capabilities SaaS management and security.
To be successful in the Cloud era, enterprises must have visibility/metrics and controls on every component to pinpoint issues efficiently, optimize and scale effectively, while having the assurance the security, compliance and polices are in place to ensure the velocity.
Native Security and Management in Azure
Enterprise grade capabilities natively from the cloud provider Azure
Integrated and interconnected across data and experiences
Management capabilities included with the flexibility to increase or choose 3rd party
Can make the point that for those familiar with OMS these were the foundation for what we now have natively within Azure.
5 main areas:
Secure: While Azure is trusted and secure platform, you as a customer have your own security settings you need to manage. You also need to be able to protect your individual machines against threats and monitor the security posture of your system.
Protect: Your VMs and applications in the cloud need to be backed up and protected in the event of data loss. With disaster recovery from on-prem to the cloud, or from one cloud to another, you can avoid downtime and keep your applications up and running.
Monitor: Every operations manager and every developer needs to be able to see the health and performance of their applications, infrastructure, and network. And seeing insights across all three together in a single dashboard can save time and resources in troubleshooting and preventing issues in the future.
Configure: For managing Azure and hybrid workloads at scale, automation and configuration capabilities help you create runbooks to automate tasks, manage the configuration settings and track changes, and monitor and deploy missing updates. Additionally in Azure you can use PowerShell and Cloud Shell for command line scripting.
Govern: Many customers need a way to look across cloud resources to assess and enforce enterprise-wide standards and policy compliance for security and management. In addition, they need to manage and monitor costs for the cloud. We recently acquired Cloudyn, a multi-cloud cost management solution to help our customers with this challenge.
Key investment themes
Site Recovery Benefits:
Automated VM level Replication
RPO of seconds and RTO of minutes
No impact DR Drills with Test Failover
Planned and unplanned failover
Orchestrated Recovery Plans for Disaster Recovery
Failback support
Migrate to Azure from anywhere
Create on-demand test copies in Azure
39
There are a bunch of interesting new capabilities so lets get started with the first area: Intelligent APM
As modern app developers, we all know how crucial it is to detect, triage and diagnose problems before they start affecting our customers. With Application Insights you get all the tools to make your diagnostics experience smarter and find and fix problems before your customers know it!
Detect: One of the most crucial things is to be able to detect issues as soon as they happen, and be alerted instantaneously. However, the issue with alerts is that it requires you to have a threshold and more often than not, you don’t have any idea. Moreover, in the complexity of modern app architecture, even an army of analysts sitting in front of a dashboard cannot detect all the different things that can go wrong. That is where proactive diagnostics come into play. With our Machine Learning based technology, you can be alerted on real time service disruptions and anomalous patterns in your app performance and behavior, with thresholds constantly evolving based on your app architecture and performance patterns.
With dashboards you can pin all the charts and KPIs across your Azure resources at a single place and share with your colleagues. You can also take advantage of the new live stream metrics to see what is going on with your application metrics at this right very moment.
Triage: Once you detect an issue, the next thing is to figure out its impact and whether it is priority enough to solve right now. With Application insights you can find out the real user impact of any exception and take decisions accordingly. With the new Application Map you can automatically detect your application topology across dependencies and client & server side components. You can find the impact assessment and click through to underlying Azure resources to find the right information.
Diagnose: Once you decide to fix an issue, you need all the context to solve it, and with our out-of-the box telemetry collection, you will have all the data you need. What’s more, if you are developing Azure Cloud Services or App Services, you can get much deeper diagnostics information, covering some of the role lifecycle issues and other performance problems.Operationalize: Once you have been through the Detect, Triage & Diagnose cycle, you can set up your own custom alerts based on the thresholds you discovered and keep being on top of things!
OK! So, lets get to our next area: Analytics
As we mentioned in the beginning, Analytics is a new capability in Application Insights we just announced at Build. And, I should say it is one of my most favorites.
In a modern app architecture with various tiers and components, it is often very difficult to diagnose problems or gaps across the entire app stack unless you can connect the various perspectives.
With our new big data query engine, you can do that very easily and find all the answers to do the root-cause analyses.
You can ask ad-hoc queries across your entire app telemetry and even do full text search to discover the right data sets.
What powers the Analytics experience is a powerful query language we launched as well.
Read through the points…
And the best thing with Application Insights is that since we collect telemetry across your application stack, you can correlate data across your Service Performance, Business Metrics and Customer Experience and generate unique insights helping you answer tough questions almost instantly.
To put it in perspective, some very high scale Microsoft services are using it today sending us Terabytes of data over which they can get answers to their queries in as little as a few seconds. E.g. internally the service ingests over 1 trillion events and 600TB a day of log data across hundreds of Microsoft cloud services. Yes, 600TB a day – that’s many petabytes of retained log storage in just one month.
Lets switch gears to our 3rd area: DevOps. As developers we would be using one or the other dev environment and have some DevOps workflows that we would be using! Having the diagnostics experience integrated with our existing practices makes it so very easy and useful! If you use Visual Studio or Visual Studio Team Services, there are a bunch of integration points that you can take advantage of.
What also makes Application Insights powerful is how it is designed to be flexible and extensible to help you get insights suited to your particular needs.