Check This Out! (CTO!) Guide (October 2023)

  • Thread starter Thread starter BrandonWilson
  • Start date Start date
B

BrandonWilson

Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide.

These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are trying to help our readers a bit more, whether that is learning, troubleshooting, or just finding new content sources! We will give you a bit of a taste of the blog content itself, provide you a way to get to the source content directly, and help to introduce you to some other blogs you may not be aware of that you might find helpful.

From all of us on the Core Infrastructure and Security Tech Community blog team, thanks for your continued reading and support!



medium?v=v2&px=400.png





Title: Click Through Demo for Windows Server 2012 Extended Security Updates Enabled by Azure Arc

Source:
Azure Arc

Author: Dan Richardson

Publication Date: 10/9/2023

Content excerpt:

As many of you know, Windows Server 2012 is reaching end-of-support (EoS) on October 10, 2023. Extended Security enabled by Azure Arc is the best way for customers to get trusted security updates and benefit from cloud capabilities including discovery, management, and patching, all in one offering.



medium?v=v2&px=400.png





Title: Azure Provides Enhanced Security Awareness with Ubuntu Pro

Source:
Azure Compute

Author: Maulik Shah

Publication Date: 10/12/2023

Content excerpt:

Bad actors can expose a new security vulnerability to initiate a DDoS attack on a customer’s infrastructure. This attack is leveraged against servers implementing the HTTP/2 protocol. Windows, .NET Kestrel, and HTTP .Sys (IIS) web servers are also impacted by the attack. Azure Guest Patching Service keeps customers secure by ensuring the latest security and critical updates are applied using Safe Deployment Practices on their VM and VM Scale Sets.



medium?v=v2&px=400.png





Title: Azure Monitor Baseline Alerts (AMBA) for Azure landing zone (ALZ) is Generally Available (GA)!

Source:
Azure Governance and Management

Author: Paul Grimley

Publication Date: 10/6/2023

Content excerpt:

Some of you may recall back in June we posted a blog introducing AMBA and since then we've received a huge amount of interest and adoption in its use as well as hearing from you on what you needed to be able to use AMBA in your environment.

We've made significant investment and progress in addressing feedback and fixes and I'm pleased to announce the AMBA pattern for ALZ is now GA! As part of GA we're also integrating the recommended alerts into the ALZ Azure Portal reference implementation for new deployments (please visit Microsoft Azure) with Bicep and Terraform support planned in the near future.




medium?v=v2&px=400.png





Title: Optimize your Cloud investment with new Azure Advisor Workbooks

Source:
Azure Governance and Management

Author: Antonio Ortoll

Publication Date: 10/10/2023

Content excerpt:

Everyone is under pressure to cut costs these days. But in times of economic flux, it’s not just about cutting costs. A successful approach lies in the ability to continuously optimize and prioritize what matters most to drive innovation, productivity, and agility and to realize an ongoing cycle of growth and innovation. Reinvestment opens the opportunity to maintain momentum when everyone else is seeking to downsize – that’s the competitive advantage optimization offers your business.



medium?v=v2&px=400.png





Title: Announcing AuthorizationResources in Azure Resource Graph

Source:
Azure Governance and Management

Author: Snaheth Thumathy

Publication Date: 10/16/2023

Content excerpt:

We are excited to announce support for Azure RBAC resources in Azure Resource Graph (ARG) via the AuthorizationResources table! You can query your Role Assignments, Role Definitions, and Classic Admins resources. With this table, you’ll be able to quickly answer questions such as “how many users are using a role definition?” or “how many role assignments are used?” or “how many role definitions are used?”. Then, you can act on the results to clean up unused role definitions, remove redundant role assignments, or optimize your existing role assignments using AAD Groups.



medium?v=v2&px=400.png





Title: Built-in Azure Monitor alerts for Azure Site Recovery is now in public preview

Source:
Azure Governance and Management

Author: Aditya Balaji

Publication Date: 10/29/2023

Content excerpt:

We are happy to share that built-in Azure Monitor alerts for Azure Site Recovery is now in public preview.

With this integration, Azure Site Recovery users will now have:


  • A way to route notifications for alerts to any of the destinations supported by Azure Monitor - which includes email, ITSM, Webhook, Functions etc.
  • An alerting experience for Azure Site Recovery which is consistent with the alerting experience currently available for many other Azure resource types.
  • Enhanced flexibility in terms of choosing which scenarios to get notified for, ability to suppress notifications during planned maintenance windows, and so on.



medium?v=v2&px=400.png





Title: Announcing General Availability: Azure Change Tracking & Inventory using Azure Monitor agent (AMA)

Source:
Azure Governance and Management

Author: Swati Devgan

Publication Date: 10/31/2023

Content excerpt:

We are excited to announce the general availability to configure Azure Change Tracking & Inventory using the Azure Monitor agent (AMA)

The Change Tracking and Inventory service tracks changes to Files, Registry, Software, Services and Daemons and uses the MMA (Microsoft Monitoring Agent)/OMS (Operations Management Suite) agent.




medium?v=v2&px=400.png





Title: Step-by-Step Guide: Setting up Custom Domain for Azure Storage Account with HTTPS Only Enabled

Source:
Azure PaaS

Author: Zoey Lan

Publication Date: 10/3/2023

Content excerpt:

If you are using Azure Storage to host your website, you might want to enable HTTPS Only to ensure secure communication between the client and the server. However, setting up a custom domain with HTTPS Only enabled can be a bit tricky. In this blog, we will guide you through the step-by-step process of setting up a custom domain for your Azure Storage account with HTTPS Only enabled.



medium?v=v2&px=400.png





Title: How to Restrict User Visibility of File Share, Queue, and Table Storage Service

Source:
Azure PaaS

Author: Sourabh Jain

Publication Date: 10/13/2023

Content excerpt:

Suppose you have a specific requirement wherein the user should not have access to view the File Share, Queue, and Table Storage Services Data. The user should only be able to access and view the containers within the storage account. In this blog, we will delve into the methods and techniques to fulfil this requirement.



medium?v=v2&px=400.png





Title: Unlocking Azure Secrets: Using Identities for Key Vault Access

Source:
Core Infrastructure and Security

Author: Joji Varghese

Publication Date: 10/2/2023

Content excerpt:

Azure Key Vault is essential for securely managing keys, secrets, and certificates. Managed Identities (MI) allow Azure resources to authenticate to any service that supports Azure AD authentication without any credentials in your code. For those looking to swiftly test Managed Identities for Azure Key Vault access from a Virtual Machine, this blog provides step-by-step implementation details. We will delve into both User Assigned Managed Identity (UAMI) and System Assigned Managed Identity (SAMI), helping you determine the best approach for your needs.



medium?v=v2&px=400.png





Title: Mobile Application Management on Windows 11

Source:
Core Infrastructure and Security

Author: Atil Gurcan

Publication Date: 10/4/2023

Content excerpt:

Intune is very well known for its ability to manage both devices (aka. MDM) and applications (aka.MAM). The core difference between these two options lies back to the level of management that companies require, or employees accept.

While MDM is seen an appropriate way to manage company-owned devices or a full zero trust environment; MAM is useful when a company wants to make sure employees can use their personal devices to run applications that access to company data, and limit what can be done with that data. From that perspective, it can improve zero trust posture of a company as well; making sure that applications used to access certain data such as the company data complies with certain criteria, that is defined in the application protection policy.




medium?v=v2&px=400.png





Title: Quick-Start Guide to Azure Private Endpoints with AKS & Storage

Source:
Core Infrastructure and Security

Author: Joji Varghese

Publication Date: 10/9/2023

Content excerpt:

Azure Private Endpoints (PE) offer a robust and secure method for establishing connections via a private link. This blog focuses on utilizing PEs to link a Private Azure Kubernetes Service (AKS) cluster with a Storage account, aiming to assist in quick Proof-of-Concept setups. Although we spotlight the Storage service, the insights can be seamlessly applied to other Azure services.



medium?v=v2&px=400.png





Title: Defender Definition Updates with ConfigMgr - Part 2 – How to set it up

Source:
Core Infrastructure and Security

Author: Stefan Röll

Publication Date: 10/16/2023

Content excerpt:

Here is Part 2 of my Blog Defender Definition Updates with ConfigMgr - Part 1 - Learnings from the Field

Currently Defender Definition Updates are called Security Intelligence Update for Windows Defender Antivirus. To keep it consistent with Part 1 of my Blog, I will keep calling them Definition Updates – The updates that are released multiple times per day.




medium?v=v2&px=400.png





Title: Service Endpoints vs Private Endpoints

Source:
Core Infrastructure and Security

Author: Khushbu Gandhi

Publication Date: 10/24/2023

Content excerpt:

For a long time, if you were using the multi-tenant, PaaS version on many Azure services, then you had to access them over the internet with no way to restrict access just to your resources. This restriction was primarily down to the complexity of doing this sort of restrictions with a multi-tenant service. At that time, the only way to get this sort of restriction was to look at using single-tenant solutions like App Service Environment or running service yourself in a VM instead of using PaaS.



medium?v=v2&px=400.png





Title: Calling Azure Resource APIs from Power Automate Using Graph Explorer

Source:
Core Infrastructure and Security

Author: Werner Rall

Publication Date: 10/31/2023

Content excerpt:

In today's fast-paced technological landscape, cloud integration and automation have ascended as twin pillars of modern business efficiency. Microsoft's Azure and Power Automate are two titans in this arena, each offering a unique set of capabilities. But what if we could marry the vast cloud resources of Azure with the intuitive workflow automation of Power Automate? In this article, we'll embark on a digital journey to explore how you can seamlessly call Azure Resource APIs from Power Automate, unlocking new vistas of potential for your business processes. Whether you're an Azure aficionado, a Power Automate pro, or someone just stepping into the cloud, strap in and let's dive deep into this integration!



medium?v=v2&px=400.png





Title: Wired for Hybrid What's New in Azure Networking September 2023 Edition

Source:
ITOps Talk

Author: Pierre Roman

Publication Date: 10/16/2023

Content excerpt:

Azure Networking is the foundation of your infrastructure in Azure. Each month we bring you an update on What’s new in Azure Networking.

In this blog post, we’ll cover what's new with Azure Networking in September 2023. In this blog post, we will cover the following announcements and how they can help you.


  • Gateway Load Balancer IPv6 Support
  • Sensitive Data Protection for Application Gateway Web Application Firewall
  • Domain fronting update on Azure Front Door and Azure CDN
  • New Monitoring and Logging Updates in Azure Firewall



medium?v=v2&px=400.png





Title: What’s new in Microsoft Entra

Source:
Microsoft Entra (Azure AD)

Author: Shobhit Sahay

Publication Date: 10/2/2023

Content excerpt:

Microsoft has recently introduced a range of new security tools and features for the Microsoft Entra product family, aimed at helping organizations improve their security posture. With the ever-increasing sophistication of cyber-attacks and the increasing use of cloud-based services and the proliferation of mobile devices, it is essential that organizations have effective tools in place to manage their security scope.

Today, we’re sharing the new feature releases for the last quarter (July – September 2023) and the change announcements (September 2023 change management train). We also communicate these changes on release notes and via email. We’re continuing to make it easier for our customers to manage lifecycle changes (deprecations, retirements, service breaking changes) within the new Entra admin center as well.




medium?v=v2&px=400.png





Title: Just-in-time access to groups and Conditional Access integration in Privileged Identity Management

Source:
Microsoft Entra (Azure AD)

Author: Joseph Dadzie

Publication Date: 10/2/2023

Content excerpt:

As part of our mission to enable customers to manage access with least privilege, we’re excited to announce the general availability of two additions to Microsoft Entra Privileged Identity Management (PIM): PIM for Groups and PIM integration with Conditional Access.



medium?v=v2&px=400.png





Title: Step-by-Step Guide to Identify Inactive Users by using Microsoft Entra ID Governance Access Reviews

Source:
Microsoft Entra (Azure AD)

Author: Dishan Francis

Publication Date: 10/10/2023

Content excerpt:

Within an organization, inactive user accounts can persist for various reasons, including former employees, service providers, and service accounts associated with products or services. These accounts may remain inactive temporarily or for extended periods. If an account remains inactive for 90 days or more, it is more likely to remain inactive. It’s crucial to periodically review these inactive accounts and eliminate any that are unnecessary. Microsoft Entra ID Governance Access Reviews now offers the capability to detect inactive accounts effectively.



medium?v=v2&px=400.png





Title: Microsoft Graph Activity Log is Now Available in Public Preview

Source:
Microsoft Entra (Azure AD)

Author: Kristopher Bash

Publication Date: 10/13/2023

Content excerpt:

Today we’re excited to announce the public preview of Microsoft Graph Activity Logs. Have you wondered what applications are doing with the access you've granted them? Have you discovered a compromised user and hoped to find out what operations they have performed? If so, you can now gain full visibility into all HTTP requests accessing your tenant’s resources through the Microsoft Graph API.



medium?v=v2&px=400.png





Title: Entra ID now enables you to receive emails in your preferred language

Source:
Microsoft Entra (Azure AD)

Author: Jairo Cadena

Publication Date: 10/17/2023

Content excerpt:

We have received feedback from you—our customers—about the need to have user level language localization. We understand that users would like to receive notifications that have their text adapted to their local language, customs, and standards.

We have added logic to check multiple places for language information to make the best possible choice for what language we should send an email in, and these changes are now generally available for Privileged Identity Management, Access Reviews and Entitlement Management.




medium?v=v2&px=400.png





Title: Windows Local Administrator Password Solution with Microsoft Entra ID now Generally Available!

Source:
Microsoft Entra (Azure AD)

Author: Sandeep Deo

Publication Date: 10/23/2023

Content excerpt:

Today we’re excited to announce the general availability of Windows Local Administrator Password Solution (LAPS) with Microsoft Entra ID and Microsoft Intune. This capability is available for both Microsoft Entra joined and Microsoft Entra hybrid joined devices. It empowers every organization to protect and secure their local administrator account on Windows and mitigate any Pass-the-Hash (PtH) and lateral traversal type of attacks.

Since our public preview announcement in April 2023, we’ve continued to see significant growth in deployment and usage of Windows LAPS across thousands of customers and millions of devices. Thank you!




medium?v=v2&px=400.png





Title: Delegate Azure role assignment management using conditions

Source:
Microsoft Entra (Azure AD)

Author: Stuart Kwan

Publication Date: 10/25/2023

Content excerpt:

We’re excited to share the public preview of delegating Azure role assignment management using conditions. This preview gives you the ability to enable others to assign Azure roles but add restrictions on the roles they can assign and who they can assign roles to. 



medium?v=v2&px=400.png





Title: New security capabilities of Event Tracing for Windows

Source:
Windows IT Pro

Author: Jose Sua

Publication Date: 10/11/2023

Content excerpt:

Elevate your security with improved Event Tracing for Windows (ETW) logs. Now you can know who initiated the actions for each device to aid in threat detection and analysis. Whether you’re in cybersecurity, IT, performance, or software development, diagnosing cybersecurity threats has never been easier. In this article, get ready to:

  • Learn about Windows event tracing.
  • Find new security-related information on a Windows device.
  • Interpret security-related events.



medium?v=v2&px=400.png





Title: The evolution of Windows authentication

Source:
Windows IT Pro

Author: Matthew Palko

Publication Date: 10/11/2023

Content excerpt:

As Windows evolves to meet the needs of our ever-changing world, the way we protect users must also evolve to address modern security challenges. A foundational pillar of Windows security is user authentication. We are working on strengthening user authentication by expanding the reliability and flexibility of Kerberos and reducing dependencies on NT LAN Manager (NTLM).

Kerberos has been the default Windows authentication protocol since 2000, but there are still scenarios where it can’t be used and where Windows falls back to NTLM. Our team is building new features for Windows 11, Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos, to address these cases. We are also introducing improved NTLM auditing and management functionality to give your organization more insight into your NTLM usage and better control for removing it.



medium?v=v2&px=400.png





Title: Windows passwordless experience expands

Source:
Windows IT Pro

Author: Sayali Kale

Publication Date: 10/23/2023

Content excerpt:

The future is passwordless. Microsoft has an ongoing commitment with other industry leaders to enable a world without passwords. Today, we are excited to announce an improved Windows passwordless experience to organizations starting with the September 2023 update for Windows 11, version 22H2.



medium?v=v2&px=400.png





Title: What’s new for IT pros in Windows 11, version 23H2

Source:
Windows IT Pro

Author: Harjit Dhaliwal

Publication Date: 10/31/2023

Content excerpt:

When you update devices running Windows 11, version 22H2 to version 23H2, you’ll get the capabilities we have delivered as part of continuous innovation, including those announced in September, enabled by default. These include:...



medium?v=v2&px=400.png











Previous CTO! Guides:




Additional resources:


Continue reading...
 
Back
Top