<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Azure on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/azure/</link><description>Recent content in Azure on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 11 Apr 2024 08:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/azure/index.xml" rel="self" type="application/rss+xml"/><item><title>Configure and deploy Azure Firewall Manager Part 3: Test the Firewall</title><link>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_3/</link><pubDate>Thu, 11 Apr 2024 08:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_3/</guid><description>&lt;p>For part 3 of the series, test the firewall in two steps. First, we’ll test the application rule; then, we’ll test the network rule. To test the firewall rules, we’ll connect a remote desktop using the firewall’s public IP address, which is NATed to Workload-1. From there, we’ll use a browser to test the application rule and connect a remote desktop to Workload-2 to test the network rule. It is important to remember, as with all testing, firewall testing is essential to maintaining a secure network and mustn’t be overlooked.&lt;/p></description></item><item><title>Configure and deploy Azure Firewall Manager Part 2: Deploy the servers</title><link>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_2/</link><pubDate>Sat, 09 Mar 2024 08:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_2/</guid><description>&lt;p>For part 2 of the series, we will deploy our workloads/servers. This process is similar as to any virtual machine deployment in the Azure Cloud.&lt;/p>
&lt;h3 id="deploy-the-servers">
 Deploy the servers
 &lt;a class="heading-link" href="#deploy-the-servers">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Deploying servers involves setting up and preparing a server to host and run applications or services. When discussing deploying servers in a cloud environment, this process often consists of creating and configuring virtual machines, setting up network connectivity and security, and installing and configuring software, all done within the cloud provider&amp;rsquo;s management interface or using infrastructure as code (IaC) tools such as Terraform.&lt;/p></description></item><item><title>Configure and deploy Azure Firewall Manager Part 1: Create a hub and spoke architecture</title><link>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_1/</link><pubDate>Mon, 26 Feb 2024 08:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_1/</guid><description>&lt;p>Azure Firewall Manager is a central network security policy and route management service for globally distributed, software-defined perimeters. It can provide security management for two network architecture types, the secured virtual hub and the hub virtual network.&lt;/p>
&lt;p>Using Azure Firewall Manager, you can create secured virtual hubs to secure your cloud network traffic destined to private IP addresses, Azure PaaS, and the Internet. Traffic routing to the firewall is automated, so there&amp;rsquo;s no need to create user-defined routes (UDRs).&lt;/p></description></item><item><title>Manage Entra ID users via Azure Portal</title><link>https://chiefdennis.github.io/projects/manage_entra_id_users/</link><pubDate>Sun, 03 Dec 2023 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/manage_entra_id_users/</guid><description>&lt;p>In this post we will learn how to create, edit and delete Microsoft Entra ID users. &lt;a href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" class="external-link" target="_blank" rel="noopener">Microsoft Entra ID&lt;/a> is an integrated cloud identity and access solution, and a leader in the market for managing directories, enabling access to applications, and protecting identities.&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/projects/manage_entra_id_users/Entra_ID_Diagram.avif" alt="image">&lt;/p>
&lt;p>To create a user, first navigate to Microsoft Entra ID in the Azure Portal.&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/projects/manage_entra_id_users/1.png" alt="image">&lt;/p>
&lt;p>Then click on Users.&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/projects/manage_entra_id_users/2.png" alt="image">&lt;/p>
&lt;p>You will be seeing the Users page. On the left hand menu, we can see the following tabs:&lt;/p></description></item></channel></rss>