Securely uploading blob files to Azure Storage from API Management

Securely uploading blob files to Azure Storage from API Management

This article is contributed. See the original author and article here.

Agenda


This article will provide a demonstration on how to utilize either SAS token authentication or managed identity from API Management to make requests to Azure Storage. Furthermore, it will explore and compare the differences between these two options.


 


Comparision


The choice between Managed Identity and SAS Token depends on factors such as the level of control required, the duration of access, and the specific security requirements of your application. Both options offer different levels of access control and security features for accessing Azure Storage.


 


Azure Managed Identity vs. SAS (Shared Access Signature) Token




















Authentication Advantage Disadvantage
Azure Managed Identity

  1. Azure Managed Identity provides an automatic and seamless way to authenticate with Azure Storage.

  2. Managed Identity allows you to specify the necessary scopes and permissions required for accessing Azure Storage. You can assign specific roles to the managed identity.

  3. With Managed Identity, you can assign RBAC roles at a granular level to control access to Azure Storage resources.

  4. Managed Identity offers a secure way to access Azure Storage, as it eliminates the need to store and manage secrets or credentials in your application code.





  1. While Managed Identity offers RBAC, the level of granularity might be limited compared to SAS tokens.

  2. Managed Identity tokens have a default lifetime and are automatically refreshed by Azure. There is limited control over token expiration.



SAS Token

  1. SAS token allows you to define specific permissions and access levels for resources in Azure Storage. This includes read, write, delete, or list operations.

  2. SAS tokens are generated for specific resources or containers in Azure Storage, providing a more restricted access scope compared to managed identities.

  3. You can set an expiration time for the SAS token, after which it becomes invalid. This provides an additional layer of security and helps to control access to storage resources.

  4. With SAS tokens, you can grant temporary access to specific resources or containers without the need for permanent credentials.





  1. SAS tokens require manual generation and management, which can be cumbersome and time-consuming, especially when dealing with multiple client applications or frequent token rotation.

  2. SAS tokens have an expiration date, and once expired, they become invalid. This requires additional effort to generate and distribute new tokens to maintain access, which may impact the continuity of your application.

  3. If not properly secured, an exposed SAS token could lead to unauthorized access to your Azure Storage resources. It is crucial to ensure secure handling and storage of SAS tokens to prevent potential security breaches.

  4. Revoking access granted through a SAS token can be challenging, as it usually requires updating the access policy or generating a new token. This might cause inconvenience and delay if you need to revoke access quickly and efficiently.




 


It is crucial to select the appropriate authentication method for accessing Azure Storage based on your specific use cases. For instance, if the permission for your client applications is permanent and long-term, it may be preferable to leverage Azure Managed Identity, as the assigned permission remains in place indefinitely. On the other hand, if you only need to grant temporary access to your client applications, it is more suitable to use SAS Token. SAS tokens can be created with an expiration date, and the permission will automatically expire once the token becomes invalid. This grants more control over the duration of access for temporary scenarios.


 


Below are the instructions to implement both Azure Managed Identity and SAS Token authentication options.


 


OPTION 1: Authentication via managed identity


This shows you how to create a managed identity for an Azure API Management instance and how to use it to access Azure Storage. A managed identity generated by Microsoft Entra ID allows your API Management instance to easily and securely access Azure Storage which is protected by Microsoft Entra ID. Azure manages this identity, so you don’t have to provision or rotate any secrets. 


 


Configuration


The initial step involves enabling the managed identity for your APIM service, followed by assigning the appropriate permissions for blob uploading. You must go to the “Managed identities” blade to enable the system assigned identity firstly.


Una_Chen_2-1703492073243.png


 


To add the storage permission, you can navigate to the same blade and click on the “Azure role assignments” button. It is important to carefully consider the role assignment based on your specific use cases, as there are multiple built-in roles available for authorizing access to blob data using Microsoft Azure Active Directory. For testing purposes, you can grant the “Storage Blob Data Contributor” permission to the managed identity.


Una_Chen_3-1703492300610.png


 


For more detailed information regarding the built-in roles for blobs, please refer to the documentation provided below.



Assign an Azure role for access to blob data – Azure Storage | Microsoft Learn


Authorize access to blobs using Microsoft Entra ID – Azure Storage | Microsoft Learn


 


Policy


In the section, I included a policy for authentication with managed identity and also for rewriting the blob path. This example utilizes the name of the storage account that is set within the named values.


 


 


 


 

<rewrite-uri template="@{
       var requestId = context.RequestId;
       return $"/{{blob-container-name}}/log-{requestId}.txt?{{blob-sas-token}}";

       2019-07-07


       BlockBlob

@(context.Request.Body.As(preserveContent: true))

 


 


 


 


 


Within the section, to make the error response from Storage side easier to troubleshoot, I use the policy to convert the response format, because it is generated in XML format.


 


 


 


 

 


 


 


 


Error example:


Una_Chen_4-1702888659061.png


 


Test


Simply using the test panel to do a test and check if everything works fine. The response will come back with 201-Created when the file has been uploaded successfully.


Una_Chen_2-1703493199335.png


 


The file upload to the storage container was successful.


Una_Chen_3-1703493212905.png


 


OPTION 2: Access Storage through SAS token 


This is a method to access Storage Account from APIM service using SAS token. By setting the SAS token as named values, it can help reuse the SAS token. 


 


One thing you might need to be careful about is that the SAS token should be handled and maintained manually because there is no integration between Storage Account and Key Vault for key re-creation.


 


Prerequisite


A SAS token is required before implementation. There are some ways to create a SAS token. You can generate the token from the Azure portal by selecting “Shared Access Signature” from the menu and providing the necessary information.


Una_Chen_0-1702888659042.png


 


Additionally, both Azure PowerShell and Azure CLI can be utilized to generate the token.


– By using the Azure PowerShell, the examples within the below documentation can help you to create the SAS token.


New-AzStorageAccountSASToken (Az.Storage) | Microsoft Learn


– By using Azure CLI


az storage account | Microsoft Learn


Example:


Una_Chen_1-1702888659048.png


 


Configuration


After generating the SAS token, let’s move forward to API management service to set up the required configurations to restore the SAS token in the Named values on for API reference.


Una_Chen_1-1703492056898.png


 


Policy


In the section, I added the policy for rewriting the blob path as well as assigning the SAS token. This example uses the name of Storage Account that is set in the named values.


 


 


 


 

<rewrite-uri template="@{
       var requestId = context.RequestId;
       return $"/{{blob-container-name}}/log-{requestId}.txt?{{blob-sas-token}}";

       2019-07-07


       BlockBlob

@(context.Request.Body.As(preserveContent: true))

 


 


 


 


 


Within the section, to make the error response from Storage side easier to troubleshoot, I use the policy to convert the response format, because it is generated in XML format.


 


 


 


 

 


 


 


 


Error example:


Una_Chen_4-1702888659061.png


 


Test


Simply using the test panel to do a test and check if everything works fine. The response will come back with 201-Created when the file has been uploaded successfully.


Una_Chen_0-1703493125789.png


 


The file upload to the storage container was successful.


Una_Chen_1-1703493148473.png


 


Conclusion


In conclusion, both Azure Managed Identity and SAS Token authentication methods offer secure ways to upload blob files to Azure Storage from API Management.


 


Azure Managed Identity provides seamless authentication and eliminates the need to store and manage credentials, improving security. It allows for granular access control through RBAC and is suitable for permanent permission scenarios. However, it is limited to Azure services and requires dependency on Azure AD.


 


SAS Token authentication offers greater flexibility with temporary access and fine-grained control over permissions. It allows for the generation of tokens with specific expiration dates, providing enhanced security. However, SAS token management can be more complex, requiring manual generation and distribution of tokens.


 


When choosing between the two methods, consider the longevity of permissions needed and the level of control required. Azure Managed Identity is ideal for long-term permissions. Assess your specific use case to determine the most secure and convenient authentication approach for uploading blob files to Azure Storage from API Management.



 

Adoption News and Resources – Wrapping up 2023

This article is contributed. See the original author and article here.

Hello Friends!  It’s been a crazy 2023 and I have to believe that 2024 will be equally fast paced.  I posted a video with 3 tips to start the year strong in 2024 given all we are work on across Microsoft 365, Copilot and employee experience areas at Microsoft.  I hope you mostly fun and also useful. 


 


 


I know you will appreciate the downloadable copies of our LinkedIn Adoption Newsletter that I’ve created for you.  If you subscribe to our Microsoft Adoption News on LinkedIn then that is wonderful, but if not I wanted to give you a special link here so you don’t have to click around.  These documents have all the recent resources we’ve posted on adoption.microsoft.com (AMC), information from across our community and notes about AMC itself.  I’ve also included the digital download of an Adoption News Special Supplement – It’s not about the AI, it’s about the Trust – On Becoming an AI Powered Organization.  LinkedIn article links are here for the main Newsletter and here for the supplemental paper in case you’d rather engage or share from there.  


In this paper I discuss hypothesis and practices yielded from observing early adoption of Copilot experiences, reviewing research and listening to adoption specialist around the world.  I’m interested to hear your perspective on the micro-action mapping and the insights that precede that.  


 


Heather Cook and I will return on Monday, January 8th with another fast-paced episode of Mondays at Microsoft to help us keep track of the changes we find ourselves navigating.  I hope you can join us, when we stream live at 8am Pacific for 30 minutes or replay.  


 


More than anything I want to say thank you for all you are doing across the communities and in your organization.  We are the compass that will keep AI adoption on track.  My team and I are so thrilled to share this journey with you!  


 

Check This Out! (CTO!) Guide (November 2023)

Check This Out! (CTO!) Guide (November 2023)

This article is contributed. See the original author and article here.

Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide, and apologies for the delay!


 


These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are trying to help our readers a bit more, whether that is learning, troubleshooting, or just finding new content sources! We will give you a bit of a taste of the blog content itself, provide you a way to get to the source content directly, and help to introduce you to some other blogs you may not be aware of that you might find helpful. 


From all of us on the Core Infrastructure and Security Tech Community blog team, thanks for your continued reading and support!


 


 


BrandonWilson_30-1703283204399.jpeg


 


 


Title: Collecting Debug Information from Containerized Applications


Source: Ask The Performance Team


Author: Will Aftring


Publication Date: 11/17/2023


Content excerpt:


This blog post will assume that you have a fundamental understanding of Windows containers. If that isn’t the case, then then I highly recommend reading Get started: Run your first Windows container.


Many developers and IT Admins are in the midst of migrating long standing applications into containers to take advantage of the myriad of benefits made available with containerization.


NOTE: Not all applications are able to equally take advantage of the benefits of containerization. It is another tool for the toolbox to be used at your discretion.


But moving an existing application into a container can be a bit tricky. With this blog post I hope to help make that process a little bit easier for you.


 


BrandonWilson_1-1703282242295.jpeg


 


 


Title: Bring Azure to your System Center environment: Announcing GA of SCVMM enabled by Azure Arc


Source: Azure Arc


Author: Karthik_KR07


Publication Date: 11/15/2023


Content excerpt:


At Microsoft, we’re committed to providing our customers with the tools they need to succeed wherever they are. By extending Azure services to the customer’s preferred environments like System Center, we empower customers with access to Azure’s potential along with a consistent experience across their hybrid estate.  
Today we’re excited to deliver on that commitment as we announce that System Center Virtual Machine Manager (SCVMM) enabled by Azure Arc is now generally available to manage SCVMM resources in Azure.
 


 


BrandonWilson_2-1703282292509.jpeg


 


 


Title: The first Windows Server 2012/R2 ESU Patches are out! Are you protected?


Source: Azure Arc


Author: Aurnov Chattopadhyay


Publication Date: 11/27/2023


Content excerpt:


It’s been almost two weeks since the first post-End of Life Patch Tuesday for Windows Server 2012/R2.  To receive that critical security patch from November’s Patch Tuesday, your servers must be enrolled in Extended Security Updates. Fortunately, it’s not too late. You can enroll in WS2012 ESUs enabled by Azure Arc anytime, with just a few steps!


 


BrandonWilson_3-1703282305646.jpeg


 


 


Title: Discover the latest Azure optimization skilling resources


Source: Azure Architecture


Author: Megan Pennie


Publication Date: 11/8/2023


Content excerpt:


Optimizing your Azure cloud investments is crucial for your organization’s success, helping you minimize unnecessary expenses, and ultimately drive better ROI. At Microsoft, we’re committed to optimizing your Azure environments and teaching you how to do it with resources, tools, and guidance, supporting continuous improvement of your cloud architectures and workloads, in both new and existing projects. We want you to gain confidence to reach your cloud goals, to become more effective and efficient when you have a better grasp of how to work in the cloud most successfully. To do that, our wide range of optimization skilling opportunities help you confidently achieve your cloud goals, resulting in more effectiveness and efficiency through a deeper knowledge of successful cloud operations.


 


BrandonWilson_4-1703282315575.jpeg


 


 


Title: Deepening Well-Architected guidance for workloads hosted on Azure


Source: Azure Architecture


Author: Uli Homann


Publication Date: 11/14/2023


Content excerpt:


I am excited to announce a comprehensive refresh of the Well-Architected Framework for designing and running optimized workloads on Azure. Customers will not only get great, consistent guidance for making architectural trade-offs for their workloads, but they’ll also have much more precise instructions on how to implement this guidance within the context of their organization.


 


BrandonWilson_5-1703282326686.jpeg


 


 


Title: Start Your Cloud Adoption Journey with the New Azure Expert Assessment Offering!


Source: Azure Architecture


Author: Pratima Sharma


Publication Date: 11/28/2023


Content excerpt:


Are you looking for a way to accelerate your cloud journey and optimize your IT infrastructure, data, and applications? If so, you might be interested in the Brand New Azure Expert Assessment Offering!  It is being launched as a new option within the Microsoft Solution Assessment Program.  This is a free one-to-one offering from Microsoft that helps you plan your cloud adoption by collaborating with a Certified Azure  Expert who will personally guide you through the assessment, and will make remediation recommendations for your organization.


 


BrandonWilson_6-1703282334101.jpeg


 


 


Title: Reduce Compute Costs by Pausing VMs (now in public preview)


Source: Azure Compute


Author: Ankit Jain


Publication Date: 11/15/2023


Content excerpt:


We are excited to announce that Azure is making it easier for customers to reduce Compute costs by providing them the ability to hibernate Virtual Machines (VMs). Starting today, customers can hibernate their VMs and resume them at a later time. Hibernating a VM deallocates the machine while persisting the VM’s in-memory state. While the VM is hibernated, customers don’t pay for the Compute costs associated with the VM and only pay for storage and networking resources associated with the VM. Customers can later start back these VMs when needed and all their apps and processes that were previously running simply resume from their last state.


 


BrandonWilson_7-1703282347194.jpeg


 


 


Title: Security and ransomware protection with Azure Backup


Source: Azure Governance and Management


Author: Utsav Raghuvanshi


Publication Date: 11/17/2023


Content excerpt:


Ransomware attacks can cause significant damage to organizations and individuals, including data loss, security breaches, and costly business disruptions. When successful, they can disable a business’ core IT infrastructure, and cause destruction that could have a debilitating impact on the physical, economic security or safety of a business. And unfortunately, over the last few years, the number of ransomware attacks have seen a significant growth in their numbers as well as their sophistication. Having a sound BCDR strategy in place is essential to meeting your overall goals when it comes to ensuring security against ransomware attacks and minimizing their possible impact on your business. To make sure all customers are well protected against such attacks, Azure Backup provides a host of capabilities, some built-in while others optional, that significantly improve the security of your backups. In this article, we discuss some such capabilities offered by Azure Backup that can help you prepare better to recover from ransomware attacks as well as other data loss scenarios.


 


BrandonWilson_8-1703282357552.jpeg


 


 


Title: Improve visibility into workload-related spend using Copilot in Microsoft Cost Management


Source: Azure Governance and Management


Author: Antonio Ortoll


Publication Date: 11/20/2023


Content excerpt:


Reducing spend is more important than ever given today’s dynamic economy. Today’s businesses strive to create efficiencies that safeguard against unpredictable shifts in the economy, beat competitors, and prioritize what matters most.  But accomplishing this is less about cutting costs and more about the ability to continuously optimize your cloud investmentsContinuous optimization can help you drive innovation, productivity, and agility and realize an ongoing cycle of growth and innovation in your business.  


 


BrandonWilson_9-1703282414996.jpeg


 


 


Title: Using Azure Site Recovery & Microsoft Defender for Servers to securely failover to malware-free VMs


Source: Azure Governance and Management


Author: Utsav Raghuvanshi


Publication Date: 11/29/2023


Content excerpt:


In this article, we will see how Azure Site Recovery offers an automated way to help you ensure that all your DR data, to which you would fail over, is safe and free of any malware using Microsoft Defender for Cloud.


Azure Site Recovery helps ensure business continuity by keeping business apps and workloads running during outages. Site Recovery replicates workloads running on physical and virtual machines (VMs) from a primary site to a secondary location. After the primary location is running again, you can fail back to it. Azure Site Recovery provides Recovery Plans to impose order, and automate the actions needed at each step, using Azure Automation runbooks for failover to Azure, or scripts.


 


BrandonWilson_10-1703282426951.jpeg


 


 


Title: Accelerate Innovation with Azure Migrate and Modernize and Azure Innovate


Source: Azure Migration and Modernization


Author: Cyril Belikoff


Publication Date: 11/15/2023


Content excerpt:


In July this year, we announced the launch of Azure Migrate and Modernize, and Azure Innovate, our flagship offerings to help accelerate your move to the cloud. Azure Migrate and Modernize helps you migrate and modernize your existing applications, data and infrastructure to Azure, while Azure Innovate helps you with your advanced innovation needs such as infusing AI into your apps and experiences, advanced analytics, and building custom cloud native applications. 


 


BrandonWilson_11-1703282442995.jpeg


 


 


Title: Secure your subnet via private subnet and explicit outbound methods


Source: Azure Networking


Author: Brian Lehr, Aimee Littleton


Publication Date: 11/16/2023


Content excerpt:


While there are multiple methods for obtaining explicit outbound connectivity to the internet from your virtual machines on Azure, there is also one method for implicit outbound connectivity – default outbound access.  When virtual machines (VMs) are created in a virtual network without any explicit outbound connectivity, they are assigned a default outbound public IP address.  These IP addresses may seem convenient, but they have a number of issues and therefore are only used as a “last resort”…


 


BrandonWilson_12-1703282454240.jpeg


 


 


Title: Understanding Azure DDoS Protection: A Closer Look


Source: Azure Network Security


Author: David Frazee


Publication Date: 11/15/2023


Content excerpt:


Azure DDoS Protection is a service that constantly innovates itself to protect customers from ever-changing distributed denial-of-service (DDoS) attacks. One of the major challenges of cloud computing is ensuring customer solutions maintain security and application availability. Microsoft has been addressing this challenge with its Azure DDoS Protection service, which was launched in public preview in 2017 and became generally available in 2018. Since its inception, Microsoft has renamed its Azure DDoS Protection service to better reflect its capabilities and features. We’ll discuss how this protection service has transformed through the years and provide more insights into the levels of protection offered by the separate tiers.


 


BrandonWilson_13-1703282464610.jpeg


 


 


Title: 2023 Holiday DDoS Protection Guide


Source: Azure Network Security


Author: Amir Dahan


Publication Date: 11/21/2023


Content excerpt:


As the holiday season approaches, businesses and organizations should brace for an increase in Distributed Denial of Service (DDoS) attacks. Historically, this period has seen a spike in such attacks, targeting sectors like e-commerce and gaming that experience heightened activity. DDoS threats persist throughout the year, but the holiday season’s unique combination of increased online activity and heightened cyber threats makes it a critical time for heightened vigilance.


 


BrandonWilson_14-1703282583571.jpeg


 


 


Title: Personal Desktop Autoscale on Azure Virtual Desktop generally available


Source: Azure Virtual Desktop


Author: Jessie Duan


Publication Date: 11/28/2023


Content excerpt:


We are excited to announce that Personal Desktop Autoscale on Azure Virtual Desktop is generally available as of November 15, 2023! With this feature, organizations with personal host pools can optimize costs by shutting down or hibernating idle session hosts, while ensuring that session hosts can be started when needed.


 


BrandonWilson_15-1703282591583.jpeg


 


 


Title: Microsoft Assessments – Milestones


Source: Core Infrastructure and Security


Author: Felipe Binotto


Publication Date: 11/7/2023


Content excerpt:


In this post, I want to talk about Microsoft Assessments but more specifically Microsoft Assessments Milestones because they are a very useful tool which is not widely used.


In case you don’t know what Microsoft Assessments are, they are a free, online platform that helps you evaluate your business strategies and workloads. They work through a series of questions and recommendations that result in a curated guidance report that is actionable and informative. 


 


BrandonWilson_16-1703282598871.jpeg


 


 


Title: Azure MMA Agent Bulk Removal


Source: Core Infrastructure and Security


Author: Paul Bergson


Publication Date: 11/13/2023


Content excerpt:


In the following sections of this blog, I will provide a step-by-step guide to help you migrate away from MMA to AMA. This guide is designed to make the transition as smooth and seamless as possible, minimizing any potential disruptions to your monitoring workflow.


But that is not all. To make things even easier, there is a GitHub site that hosts the necessary binaries for this migration process. These binaries will be used to install a set of utilities in Azure, including a process dashboard. This dashboard will provide you with a visual representation of the migration process, making it easier to track and manage.


 


BrandonWilson_17-1703282605135.jpeg


 


 


Title: Active Directory Hardening Series – Part 2 – Removing SMBv1


Source: Core Infrastructure and Security


Author: Jerry Devore


Publication Date: 11/20/2023


Content excerpt:


Ok, let’s get into today’s topic which is removing SMBv1 from domain controllers. Like my previous blog on NTLM, a lot of great content has already been written on SMBv1.   My objective is to not to rehash the why but rather focus on how you can take action in a production environment.


 


BrandonWilson_18-1703282611802.jpeg


 


 


Title: The Twelve Days of Blog-mas: No.1 – A Creative Use for Intune Remediations


Source: Core Infrastructure and Security


Author: Michael Hildebrand


Publication Date: 11/28/2023


Content excerpt:


For Post #1, I offer to you a quick’n’easy way to use Intune Remediations to get some info from Windows PCs.


Last reboot dates/times are frequently used as simple indicators of life for devices.  I was asked if this is captured anywhere in Intune and oddly, I’d never looked – but as I went hunting through Intune (Portal and Graph), the more I looked, the more I couldn’t find it anywhere obvious. Surely it can’t be THIS hard…?


 


BrandonWilson_19-1703282620336.jpeg


 


 


Title: Connecting to Azure Services on the Microsoft Global Network 


Source: Core Infrastructure and Security


Author: Preston Romney


Publication Date: 11/28/2023


Content excerpt:


Azure Services and the solutions you deploy into Azure are connected to the Microsoft global wide-area network also known as the Microsoft Global Network or the Azure Backbone. There are a few different ways to connect to an Azure service from a subnet, depending on your requirements around securing access to these services. Your requirements should dictate which method you choose.There are some common misconceptions around connectivity, and the goal of this article is to provide some clarity around connecting to Azure Services.


 


BrandonWilson_20-1703282625300.jpeg


 


 


Title: The Twelve Days of Blog-mas: No.2 – Windows Web Sign in and Passwordless


Source: Core Infrastructure and Security


Author: Michael Hildebrand


Publication Date: 11/29/2023


Content excerpt:


Hi folks – welcome to the second post in the holiday ’23 series.


Today’s post is about a capability that came to preview long ago but recently surprised much of the world and moved to General Availability (GA).


 


BrandonWilson_21-1703282632621.jpeg


 


 


Title: The Twelve Days of Blog-mas: No.3 – Windows Local Admin Password Solution (LAPS)


Source: Core Infrastructure and Security


Author: Michael Hildebrand


Publication Date: 11/30/2023


Content excerpt:


Buenos días and welcome to número tres in the holiday ’23 series. 


This one is sure to please the crowd – it’s the NEW AND IMPROVED easy to setup/deploy/use solution for when IT Ops/Support needs a local admin ID and password to perform some management task(s) on a Windows endpoint. 


 


BrandonWilson_22-1703282639032.jpeg


 


 


Title: First Party Services Adoption for Migrated Virtual Machines via Azure Policy


Source: FastTrack for Azure


Author: Alejandra8481


Publication Date: 11/2/2023


Content excerpt:


Server migrations to Azure Virtual Machines either through Azure Migrate or via a redeploy approach can benefit from Azure policies to accelerate adoption of Azure first party services across BCDR, Security, Monitoring and Management. 


Our Cloud Adoption Framework’s guidance for Azure Landing Zones already provides a good baseline of recommended Azure policies. However, a variation to this baseline is described in this article with a focus on newly migrated Azure Virtual Machine resources.  


 


BrandonWilson_23-1703282646001.jpeg


 


 


Title: Windows Events, how to collect them in Sentinel and which way is preferred to detect Incidents


Source: FastTrack for Azure


Author: Lizet Pena De Sola


Publication Date: 11/20/2023


Content excerpt:


How can a SOC team ingest and analyze Windows Logs with Microsoft Sentinel? What are the main options to ingest Windows Logs into a Log Analytics Workspace and use Microsoft Sentinel as a SIEM to manage security incidents from events recorded on these logs?


Read on to find out!


 


BrandonWilson_24-1703282653077.jpeg


 


 


Title: Step-by-Step : Assign access packages automatically based on user properties in Microsoft Entra ID


Source: ITOps Talk


Author: Dishan Francis


Publication Date: 11/27/2023


Content excerpt:


Traditionally, during the setup of an access package, you could specify who can request access, including users and groups in the organization’s directory or guest users. Now, you have the option to use an automatic assignment policy to manage access packages. This policy includes membership rules that evaluate user attribute values to determine access. You can create one automatic assignment policy per access package, which can assess built-in user attributes or custom attribute values generated by third-party HR systems and on-premises directories. Behind the scenes, Entitlement Management automatically creates dynamic security groups based on the policy rules, which are adjusted as the rules change. 


 


BrandonWilson_25-1703282659262.jpeg


 


 


Title: Extended Security Updates (ESUs): Online or proxy activation


Source: Windows IT Pro


Author: Poornima Priyadarshini


Publication Date: 11/9/2023


Content excerpt:


When your Windows products reach the end of support, Extended Security Updates (ESUs) are there to protect your organization while you modernize your estate. To take advantage of this optional service, you’d purchase and download ESU product keys, install them, and finally activate the extended support.


 


BrandonWilson_26-1703282663966.jpeg


 


 


Title: Windows Server 2012/R2: Extended Security Updates


Source: Windows IT Pro


Author: Poornima Priyadarshini


Publication Date: 11/9/2023


Content excerpt:


You can now get three additional years of Extended Security Updates (ESUs) if you need more time to upgrade and modernize your Windows Server 2012, Windows Server R2, or Windows Embedded Server 2012 R2 on Azure. This also applies to Azure Stack HCI, Azure Stack Hub, and other Azure products.


 


BrandonWilson_27-1703282667561.jpeg


 


 


Title: Universal Print makes cloud printing truly “universal”


Source: Windows IT Pro


Author: Robert Cunningham


Publication Date: 11/15/2023


Content excerpt:


Universal Print is a cloud-based print solution that enables a simple, rich, and secure print experience for users while also reducing time and effort for IT pros. By shifting print management to the cloud, IT professionals can simplify administration and end-users can easily print, reducing the expense of organizations’ print infrastructure.


 


BrandonWilson_28-1703282673708.jpeg


 


 


Title: Copilot coming to Windows 10


Source: Windows IT Pro


Author: Alan Meeus


Publication Date: 11/20/2023


Content excerpt:


Today, we start to roll out Copilot in Windows (in preview) for Windows 10, version 22H2 to Windows Insiders in the Release Preview Channel. Bringing Copilot to Windows 10 enables organizations managing both Windows 11 and Windows 10 devices to continue considering a rollout of Copilot in Windows and provide this powerful productivity experience to more of their workforce.


 


BrandonWilson_29-1703282679630.jpeg


 


 


  


 


 


Previous CTO! Guides:



 


Additional resources:


Get Rewarded for Sharing Your Experience with Azure Machine Learning

Get Rewarded for Sharing Your Experience with Azure Machine Learning

This article is contributed. See the original author and article here.

mmonsma_0-1703273361748.png


Artificial Intelligence (AI) and Machine Learning (ML) have become essential tools for businesses to stay competitive in today’s data-driven world. Whether you’re working with traditional ML or generative AI, with Microsoft Azure Machine Learning, we strive to empower your data science and app developments teams to build, fine-tune, evaluate, deploy, and manage high-quality models at scale, with confidence. The platform is built to help organizations accelerate time to value with industry-leading MLOps, open-source interoperability, responsible AI practices, integrated tools, and built-in governance, security, and compliance for running machine learning workloads anywhere. We continually improve with the valued input of our customers.


 


Your voice matters—help other organizations learn about Azure Machine Learning


We humbly invite our customers to get rewarded for sharing your first-hand experience working with Azure Machine Learning by writing a review on Gartner Peer Insights. Your review will not only assist other developers, data scientists, and technical decision-makers in their platform evaluation process, but also help shape the future of our platform. Thank you for your time and feedback!


 















Write a review and claim your reward*


mmonsma_1-1703273464459.png

*Reward: You will receive a $25 gift card, a 3-month subscription to Gartner research, or a donation to a charitable cause as a token of our appreciation.



 


Writing a Review is Simple:



  • Highlight your experience using Azure Machine Learning.

  • Personal emails are not accepted, so please use your business email or sign in with LinkedIn.

  • You must attest to not being an employee, partner, consultant, reseller, or a direct competitor of Microsoft.

  • Explore past reviews here: Microsoft Azure Machine Learning Reviews


 


What is Gartner Peer Insights?


Gartner Peer Insights is a trusted online platform where IT professionals and technology decision-makers read and write reviews and ratings for various IT software and services. Your review holds immense value in helping others make informed decisions and finding solutions that meet their unique needs.


 


mmonsma_2-1703273523214.png


 


Terms and Conditions Apply:



  • Your privacy is paramount, as only your role, industry, and organization size will be displayed.

  • The reviewer must be an Azure AI customer and be a working enterprise professional including technology decision-makers, enterprise-level users, executives, and their teams (e.g., students and freelancers are not allowed to submit a review). The reviewer must: attest to the authenticity of the review by certifying that (i) he or she is not an employee of Microsoft a partner of Microsoft or a direct competitor of Microsoft; (ii) employed by an organization with an exclusive relationship with the product being reviewed (this includes exclusive partners, value-added resellers, system integrators, and consultants); and (iii) the feedback is based entirely on his or her own personal experience with Microsoft’s Azure AI.

  • The offer is good only for those who submit a product review on Gartner Peer Insights and receive confirmation their review has been approved by Gartner. Limited to one reward per person. This offer is non-transferable and cannot be combined with any other offer. The offer is valid while supplies last. It is not redeemable for cash. Taxes, if there are any, are the sole responsibility of the recipient.  Any gift returned as non-deliverable will not be re-sent. Please allow 6-8 weeks for shipment of your gift. Microsoft reserves the right to cancel, change, or suspend this offer at any time without notice. This offer is not applicable in Cuba, Iran, North Korea, Sudan, Syria, Crimea, Russia, and China. For more information, please refer to Gartner Peer Programs Community Guidelines.


 


Your Privacy Matters:


Rest assured that the respondent’s information will only be used for the purpose of mailing the gifts to recipients. For more information, please review our Microsoft Privacy Statement.


 

Simplify your Windows 365 Enterprise deployment with the updated Windows 365 deployment checklist

Simplify your Windows 365 Enterprise deployment with the updated Windows 365 deployment checklist

This article is contributed. See the original author and article here.

We’re excited to announce that we’ve just released an updated Windows 365 deployment checklist in the Microsoft 365 admin center (MAC).   


 


What is Windows 365? 


Windows 365 is a cloud-based Desktop as a service (DaaS) solution that automatically creates a new type of Windows virtual machine for your customer, known as a Cloud PC. A Cloud PC is a highly available, optimized, and scalable virtual machine that provides customers with a rich Windows desktop experience. Cloud PCs are hosted in the Windows 365 service and is accessible from anywhere, on any device (Learn more about Windows 365).  


 


Windows 365 deployment is made to be simple (to see an end-to-end deployment overview, visit Overview of Windows 365 deployment). However, we understand that our customers have unique and complex environments.  


 


What is the Windows 365 deployment checklist?  


To help you integrate Windows 365 with your existing enterprise environment, we’ve compiled learnings and best practices from the Microsoft 365 FastTrack Team, which has worked with hundreds of enterprise customers. We’re excited to offer these in an updated Windows 365 deployment checklist experience as part of the Advanced Deployment Guides in the Microsoft 365 Admin Center. This checklist will guide you as you plan, deploy, and scale Windows 365 in your environment.  


Josh_Gutierrez_0-1703191098751.png


 


 
 


   


The Windows 365 deployment checklist guides admins through the considerations around Azure basics, identity, networking, licensing, management, security, applications, and end user experiences that are applicable to their deployment configuration. Admins can assign tasks for each area to the responsible stakeholders and define a target date of completion. Admins can also see a summary view with an overall status to track progress against their timelines. 


 


Josh_Gutierrez_1-1703191098753.png


 


 


 


How can I access the Windows 365 deployment checklist?  


To access the Windows Enterprise 365 checklist, visit this link or directly at https://go.microsoft.com/fwlink/?linkid=2251210. 


 


Additional Resources: