Tech Blogs

All Tech Blogs Blogs

Using Policy Analytics for Azure Firewall to Reinforce Security

With the evolving nature of workload demands, it’s important to ensure your network security policies are keeping up pa…

Azure Deployment Environments now in Preview 

Any business knows that development in cloud environments require a fast, secure, and compliant way to allocate resourc…

Common Azure Cost Optimisation Practices

There are various ways to achieve a cost-effective, well-architected framework (WAF) Azure environment. We have selecte…

Retire Internet Explorer Early with a Group Policy

Internet Explorer (IE) 11 is approaching the end of its era and will soon be fully retired. If you weren’t aware, there…

Restrict Access to BitLocker Recovery Key (Preview)

When BitLocker is enabled on a Windows device, the recovery key can be saved to Azure Active Directory (Azure AD), a US…

Using Azure AD Entitlement Management for Automated Access

Azure Active Directory (Azure AD) has been updated to include a new preview in Entitlement Management of automatic assi…

Import ADMX Files into Intune 

Do you use Intune (AKA Microsoft Endpoint Manager) to manage your devices?   If so, you’ll probably already be aware th…

ExpressRoute Traffic Collector (Preview)

ExpressRoute Traffic Collector, is a service that enables deep visibility into traffic within ExpressRoute Circuits. Th…

Trigger a DevOps Pipeline from the Azure DevOps Rest API Webhook

Sometimes, you need the ability to trigger a DevOps build or release pipeline when a condition is met through a piece o…

Taking Advantage of Azure Container Apps

Containers provide users with a consistent environment to develop and run applications. They act as a software bundle…