Quick Reference: Monitor sign-in and audit logs Organizations should monitor sign-in and audit log activity from the emergency accounts and trigger notifications to other administrators. When you monitor the activity on break glass accounts, you can verify these accounts are only used for testing or actual emergencies. You can use Azure Log Analytics to monitor Read More
Category: Azure
How to Delay an Applicaiton to be Installed AFTER Autopilot Enrollment.
To make sure the app isn’t installed during Autopilot, we have got some options at our disposal. 1. You could configure the app as available so end-users could install the app on their own. 2. We could change the App availability to make sure the app is downloaded on a specific date but that’s not what I Read More
Enable Just-in-Time Access on Azure VMs
You can use Microsoft Defender for Cloud’s just-in-time (JIT) access to protect your Azure virtual machines (VMs) from unauthorized network access. Many times firewalls contain allow rules that leave your VMs vulnerable to attack. JIT lets you allow access to your VMs only when the access is needed, on the ports needed, and for the Read More
How to Fix Remote Desktop Web Client Cannot Connect to Azure Virtual Desktop
If you can’t sign in and keep receiving an error message that says your credentials are incorrect, first make sure you’re using the right credentials. If you keep seeing error messages, check to make sure you’ve fulfilled the following requirements: 1, Have you assigned the Virtual Machine User Login role-based access control (RBAC) permission to the virtual Read More
How to Use DataBox to Migrate from NAS to Azure File Shares
This migration article is one of several involving the keywords NAS and Azure DataBox. Check if this article applies to your scenario: Data source: Network Attached Storage (NAS) Migration route: NAS ⇒ DataBox ⇒ Azure file share No caching files on-premises: Because the final goal is to use the Azure file shares directly in the Read More
How to Troubleshoot 1Password Azure SCIM Bridge
All Kubernetes commands are run from the Azure Cloud Shell. First, Let’s check if your pod was running: Next, check your SCIM bridge logs to see if there is any errors: Semms Let’s Encrypt rate-limited the server from obtaining a new TLS certificate; therefore, you will need to update your DNS record to bypass this. for example, Read More