Algemeen Flashcards
Azure access reviews
User’s access can be reviewed regularly to make sure only the right people have continued access. Can be used to manage group memberships, access to enterprise applications, and role assignments.
If access is not granted within the timeframe of the review, the user can be automatically denied access.
Microsoft AD Application Proxy
Application Proxy is a feature of Microsoft Entra ID that enables users to access on-premises web applications from a remote client. Application Proxy includes both the Application Proxy service which runs in the cloud, and the Application Proxy connector which is a lightweight agent that runs on an on-premises server.
- After the user has accessed the application through an endpoint, the user is directed to the Microsoft Entra sign-in page. Users can reach applications while outside of your network by accessing an external URL.
- After a successful sign-in, Microsoft Entra ID sends a token to the user’s client device.
- The client sends the token to the Application Proxy service, which retrieves the user principal name (UPN) and security principal name (SPN) from the token.
- Application Proxy then sends the request to the Application Proxy connector. The connector only uses outbound connections.
- If you have configured single sign-on, the connector performs any additional authentication required on behalf of the user, against the on-premise AD.
- The connector sends the request to the on-premises application.
- The response is sent through the connector and Application Proxy service to the user.
Adding the on-premise web as an Azure AD enterprise application to enables Azure AD to provide SSO authentication and authorization for the app.
Azure AD App registration
Azure AD app registration allows you to integrate your application with Azure AD. By doing this, you can leverage Azure AD’s authentication mechanisms, including SSO. Once the app is registered in Azure AD and configured for SSO, users who are already signed in to their Azure AD account can access the application without being prompted for authentication again.
Azure Network Watcher
Azure Network Watcher provides a suite of tools to monitor, diagnose, view metrics, and enable or disable logs for Azure IaaS (Infrastructure-as-a-Service) resources. Network Watcher enables you to monitor and repair the network health of IaaS products. Network Watcher isn’t designed or intended for PaaS monitoring or Web analytics.
When you create or update a virtual network in your subscription, Network Watcher is automatically enabled in your virtual network’s region.
Network Watcher consists of three major sets of tools and capabilities:
1. Monitoring
2. Network diagnostic tools
3. Traffic
NSG flow logging requires the Microsoft.Insights provider, the flow logs are stored in a storage account.
Specific tools:
- IP flow verify checks if a packet is allowed or denied to or from a virtual machine, so it works at a VM level. The information consists of direction, protocol, local IP, remote IP, local port, and a remote port. If the packet is denied by a security group, the name of the rule that denied the packet is returned.
- NSG Flow logs enable you to log 5-tuple flow information about your Azure IP traffic that passes through a network security group or Azure virtual network. This data can be used by Traffic Analytics to analyze network traffic in your environment.
- Connection Troubleshoot. The connection troubleshoot feature of Network Watcher provides the capability for a one-time check a direct TCP connection from a virtual machine to a virtual machine (VM), fully qualified domain name (FQDN), URI, or IPv4 address.
- The connection monitor capability monitors communication at a regular interval and informs you of reachability, latency, and network topology changes between the VM and the endpoint over a period of time. You can select only the source VMs that are created in the region of the connection monitor.
- Variable packet capture allows you to create packet capture sessions to track traffic to and from a virtual machine or a scale set.
- Network Performance Monitor - for latency and network issues in hybrid, on-premises, across environments setups.
Azure Policy
Azure Policy evaluates resources in Azure by comparing the properties of those resources to business rules, policy definitions. To simplify management, several business rules can be grouped together to form a policy initiative
Through its compliance dashboard, it provides an aggregated view to evaluate the overall state of the environment, with the ability to drill down to the per-resource, per-policy granularity. It also helps to bring your resources to compliance through bulk remediation for existing resources and automatic remediation for new resources.
Can be assigned to Mg, Sub, Rg, resource, not to tenant. Inherits down and subscopes can be excluded.
Azure Event Grid
Event Grid follows the Publisher-Subscriber pattern. When event sources trigger events, they’re published to Event Grid topics. Consumers of those events create Event Grid subscriptions by specifying event types and event handler that will process the events. If there are no subscribers, the events are discarded. Each event can have multiple subscriptions. Event Grid propagates messages to the subscribers in a push model.
Event Hub
When you’re working with an event stream, Azure Event Hubs is the recommended message broker. Essentially, it’s a large buffer that’s capable of receiving large volumes of data with low latency. The received data can be read quickly through concurrent operations. You can transform the received data by using any real-time analytics provider. Event Hubs also provides the capability to store events in a storage account. Event Hubs is capable of ingesting millions of events per second. The events are only appended to the stream and are ordered by time.
Uses pull not push for subscribers.
Azure API Management
Azure API Management is a hybrid, multicloud management platform for APIs across all environments. As a platform-as-a-service, API Management supports the complete API lifecycle.
It supports features such as rate limiting, integration of OAuth2 authentication providers for access control to the API.
Log Analytics Workspace
A Log Analytics workspace is a unique environment for log data from Azure Monitor and other Azure services, such as Microsoft Sentinel and Microsoft Defender for Cloud. Each workspace has its own data repository and configuration but might combine data from multiple services.
Azure Monitor Agent
Azure Monitor Agent (AMA) collects monitoring data from the guest operating system of Azure and hybrid virtual machines and delivers it to Azure Monitor for use by features, insights, and other services, such as Microsoft Sentinel and Microsoft Defender for Cloud. Azure Monitor Agent replaces all of Azure Monitor’s legacy monitoring agents.
Azure Blueprints
Blueprints are a declarative way to orchestrate the deployment of various resource templates and other artifacts such as:
Role Assignments
Policy Assignments
Azure Resource Manager templates (ARM templates)
Resource Groups
The blueprint definitions are saved to a subscription or management group, and it can then be assigned to that subscription or subs contained in the mg. Assignmemt to a mg is possible, but then only the metadata is saved at the mg level, the assignment must still be to a specific sub.
Azure Policy effect for tags
Append is intended for use with non-tag properties. While Append can add tags to a resource during a create or update request, it’s recommended to use the Modify effect for tags instead.
Policy assignments with effect set as Modify require a managed identity to do remediation.
Protecting Azure App Service settings
Key Vault references can be used as values for Application Settings, allowing you to keep secrets in Key Vault instead of the site config. Application Settings are securely encrypted at rest, but if you need secret management capabilities, they should go into Key Vault. To use a Key Vault reference for an app setting, set the reference as the value of the setting. Your app can reference the secret through its key as normal. No code changes are required.
Application managed identity requires get permission on secrets to read them.
Analyzing Cosmos DB data with Azure Synapse Analytics
Azure Synapse Link for Azure Cosmos DB creates a tight integration between Azure Cosmos DB and Azure Synapse Analytics. It enables customers to run near real-time analytics over their operational data with full performance isolation from their transactional workloads and without an ETL pipeline.
Role assignments and nested groups
Members in the nested group inherit roles granted the parent group.
Azure Policy on-demand scan
Cannot be started from the portal, only from CLI, Powershell, REST,…
Azure storage authorization options
Search ‘authorize access to storage data’
Access methods to storage data
- Shared key, using the storage account key
- SAS, two types: user delegation SAS (only for BLOB), or service SAS (for one of the storage services), account SAS (for one or more of the storage services, or service level ops). SAS can be ad-hoc woth access constraints specified in the SAS URI, or associated with a stored access policy (only for service SAS), which is defined at the blob container or file share level and provides constraints.
- Azure AD account. MS recommended.
Azure Batch
Use Azure Batch to run large-scale parallel and high-performance computing (HPC) batch jobs efficiently in Azure.
Immutable storage
Configured in the container access policy. Immutable storage for Azure Blob Storage enables users to store business-critical data in a WORM (Write Once, Read Many) state. While in a WORM state, data cannot be modified or deleted for a user-specified interval.
Time-based retention policies or legal hold policies are available.
SQL Server Auditing
Auditing an instance of SQL Server or a SQL Server database involves tracking and logging events that occur on the system. The SQL Server Audit object collects a single instance of server- or database-level actions and groups of actions to monitor. The audit is at the SQL Server instance level. You can have multiple audits per SQL Server instance. The Server Audit Specification object belongs to an audit.
V1 storage accounts are not supported.
Azure Data Factory
Azure Data Factory is a cloud-based data integration service that allows you to create, schedule, and manage data pipelines.
Azure SQL Database and Azure SQL Managed Instance TDE max. key strength
RSA 3072