Using Policy Analytics for Azure Firewall to Reinforce Security
With the evolving nature of workload demands, it’s important to ensure your network security policies are keeping up pa…
Azure Deployment Environments now in Preview
Any business knows that development in cloud environments require a fast, secure, and compliant way to allocate resourc…
Common Azure Cost Optimisation Practices
There are various ways to achieve a cost-effective, well-architected framework (WAF) Azure environment. We have selecte…
Retire Internet Explorer Early with a Group Policy
Internet Explorer (IE) 11 is approaching the end of its era and will soon be fully retired. If you weren’t aware, there…
Restrict Access to BitLocker Recovery Key (Preview)
When BitLocker is enabled on a Windows device, the recovery key can be saved to Azure Active Directory (Azure AD), a US…
Using Azure AD Entitlement Management for Automated Access
Azure Active Directory (Azure AD) has been updated to include a new preview in Entitlement Management of automatic assi…
Import ADMX Files into Intune
Do you use Intune (AKA Microsoft Endpoint Manager) to manage your devices? If so, you’ll probably already be aware th…
ExpressRoute Traffic Collector (Preview)
ExpressRoute Traffic Collector, is a service that enables deep visibility into traffic within ExpressRoute Circuits. Th…
Trigger a DevOps Pipeline from the Azure DevOps Rest API Webhook
Sometimes, you need the ability to trigger a DevOps build or release pipeline when a condition is met through a piece o…
Taking Advantage of Azure Container Apps
Containers provide users with a consistent environment to develop and run applications. They act as a software bundle…