Submit Search
Upload
Flash card Module 9- Manage Security Operation in Azure
•
Download as PPTX, PDF
•
0 likes
•
351 views
Y
Yoong Seng Lai
Follow
Flash card Module 9- Manage Security Operation in Azure
Read less
Read more
Technology
Report
Share
Report
Share
1 of 12
Download now
Recommended
Flash Card -Architect Infrastructure Operation in Azure
Flash Card -Architect Infrastructure Operation in Azure
Yoong Seng Lai
Flash Card-Architect Compute Infrastructure in Azure
Flash Card-Architect Compute Infrastructure in Azure
Yoong Seng Lai
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
Yoong Seng Lai
Flash card Module 12-Administer Container in Azure
Flash card Module 12-Administer Container in Azure
Yoong Seng Lai
Flash card architect network infra in azure
Flash card architect network infra in azure
Yoong Seng Lai
Flash Card Module 10-Implement Resource Management Security in Azure
Flash Card Module 10-Implement Resource Management Security in Azure
Yoong Seng Lai
Flash Card : Manage Resources in Azure
Flash Card : Manage Resources in Azure
Yoong Seng Lai
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Yoong Seng Lai
Recommended
Flash Card -Architect Infrastructure Operation in Azure
Flash Card -Architect Infrastructure Operation in Azure
Yoong Seng Lai
Flash Card-Architect Compute Infrastructure in Azure
Flash Card-Architect Compute Infrastructure in Azure
Yoong Seng Lai
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
Yoong Seng Lai
Flash card Module 12-Administer Container in Azure
Flash card Module 12-Administer Container in Azure
Yoong Seng Lai
Flash card architect network infra in azure
Flash card architect network infra in azure
Yoong Seng Lai
Flash Card Module 10-Implement Resource Management Security in Azure
Flash Card Module 10-Implement Resource Management Security in Azure
Yoong Seng Lai
Flash Card : Manage Resources in Azure
Flash Card : Manage Resources in Azure
Yoong Seng Lai
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Yoong Seng Lai
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Yoong Seng Lai
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Yoong Seng Lai
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Hayato Kiriyama
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
Flash card introduction to azure vm
Flash card introduction to azure vm
Yoong Seng Lai
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Securing AWS Environments
Securing AWS Environments
Ashish Kaushik
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
Amazon Web Services
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Amazon Web Services
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Amazon Web Services
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Amazon Web Services
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
Yoong Seng Lai
DevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security Success
Puma Security, LLC
More Related Content
What's hot
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Yoong Seng Lai
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Yoong Seng Lai
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Hayato Kiriyama
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
Flash card introduction to azure vm
Flash card introduction to azure vm
Yoong Seng Lai
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Securing AWS Environments
Securing AWS Environments
Ashish Kaushik
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
Amazon Web Services
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Amazon Web Services
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Amazon Web Services
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Amazon Web Services
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
What's hot
(20)
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Flash card introduction to azure vm
Flash card introduction to azure vm
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Securing AWS Environments
Securing AWS Environments
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Similar to Flash card Module 9- Manage Security Operation in Azure
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
Yoong Seng Lai
DevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security Success
Puma Security, LLC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
Amazon Web Services
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Combell NV
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
Amazon Web Services
Cisco Security portfolio update
Cisco Security portfolio update
Atanas Gergiminov
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
Amazon Web Services
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
YounesChafi1
Security hardening of core AWS services
Security hardening of core AWS services
Runcy Oommen
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon Web Services
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
team-WIBU
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Amazon Web Services
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Amazon Web Services
CloudPassage Overview
CloudPassage Overview
CloudPassage
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
CA Technologies
Elevate your security with the cloud
Elevate your security with the cloud
Amazon Web Services
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Amazon Web Services
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
Amazon Web Services
Hybrid Cloud – Live Demo
Hybrid Cloud – Live Demo
Amit Gatenyo
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
Prince Joseph
Similar to Flash card Module 9- Manage Security Operation in Azure
(20)
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
DevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security Success
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Back-ups: Hoe ze je kunnen redden van een cyberaanval
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
Cisco Security portfolio update
Cisco Security portfolio update
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
Security hardening of core AWS services
Security hardening of core AWS services
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
CloudPassage Overview
CloudPassage Overview
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
Elevate your security with the cloud
Elevate your security with the cloud
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
Hybrid Cloud – Live Demo
Hybrid Cloud – Live Demo
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
More from Yoong Seng Lai
Flash card security-azure disk
Flash card security-azure disk
Yoong Seng Lai
Flash card managing using azure cli
Flash card managing using azure cli
Yoong Seng Lai
Flash card caching and performance in azure storage disk
Flash card caching and performance in azure storage disk
Yoong Seng Lai
Flash card azure disk
Flash card azure disk
Yoong Seng Lai
Flash card azure automation state
Flash card azure automation state
Yoong Seng Lai
Extending Availability to the Cloud
Extending Availability to the Cloud
Yoong Seng Lai
Business Continuity with Disaster Recovery
Business Continuity with Disaster Recovery
Yoong Seng Lai
More from Yoong Seng Lai
(7)
Flash card security-azure disk
Flash card security-azure disk
Flash card managing using azure cli
Flash card managing using azure cli
Flash card caching and performance in azure storage disk
Flash card caching and performance in azure storage disk
Flash card azure disk
Flash card azure disk
Flash card azure automation state
Flash card azure automation state
Extending Availability to the Cloud
Extending Availability to the Cloud
Business Continuity with Disaster Recovery
Business Continuity with Disaster Recovery
Recently uploaded
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Recently uploaded
(20)
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Flash card Module 9- Manage Security Operation in Azure
1.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Flash Card – Manage security operation in Azure Prepared by Lai
2.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Security Center Monitoring service that provide threat protection across services in Azure & on-prem Free Tier Limited to assessment & recommendation of Azure resources Standard Tier Full suite of security related services including continuous monitoring, threat detection, just in time access control for ports & more
3.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Security Center View Security Alert Workflow automation
4.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Stop brute force attack Disable public IP address & use VPN Use two factor authentication Limit login attempt Increase password length & complexity Implement Captcha Limit amount of time that the ports are open Enable JIT VM access (restrict access to management ports when not in use & approved IP add that can access these ports) -STANDARD TIER-
5.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Protect against malware Install antimalware – Microsoft Antimalware for Azure Cloud Services & VM Use firewall to block network traffic Integrate antimalware solution with Azure Security Center to monitor the status of the anti malware protection Up to date latest OS fixes and version Antimalware available as an extension
6.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Active Directory Cloud based identity service. Built in support for synchronization with existing on-prem AD or standalone Authentication SSO MFA
7.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Encryption Encrypt raw storage -Azure storage Service Encryption Encrypt VM disk -Azure Disk Encryption (bitlocker or dm- crypt) Encrypt database -Transparent data encryption (encrypt/decryption of the database, backup & transaction log files Encrypt secret Use Azure Key Vault to protect secret key
8.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Protect Network Azure Firewall Managed, cloud based, network security service that protect Azure Virtual Network Resources . Stateful Azure Application Gateway Is a load balancer that include Web Application Firewall (WAF). Designed to protect HTTP traffic Network Virtual Appliance Similar like hardware firewall appliances
9.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Virtual network Security Filter network traffic to & from Azure resources in an Azure virtual network. Network Security Group (NSG) VPN Secure comm channel between on-prem & cloud
10.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Protect Shared Document Classify and optionally protect doc & email by applying label Azure Information Protection (AIP)
11.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor Log Extract valuable info about your infra from log data Gather Monitoring & Diagnostic info about the health of services Visualize & analyze the causes of the problem Collect Metric - How resource is performing & consuming Collect Log - Show when resources are created or modified
12.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Thank You
Download now