Enviar búsqueda
Cargar
Architect Infrastructure in Azure
•
0 recomendaciones
•
216 vistas
Título mejorado por IA
Y
Yoong Seng Lai
Seguir
Flash Card Architect Infrastructure Operation in Azure
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 16
Descargar ahora
Descargar para leer sin conexión
Recomendados
Flash card Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
Yoong Seng Lai
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
Yoong Seng Lai
Flash Card-Architect Compute Infrastructure in Azure
Flash Card-Architect Compute Infrastructure in Azure
Yoong Seng Lai
Flash card Module 12-Administer Container in Azure
Flash card Module 12-Administer Container in Azure
Yoong Seng Lai
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Yoong Seng Lai
Flash Card : Manage Resources in Azure
Flash Card : Manage Resources in Azure
Yoong Seng Lai
Flash Card Module 10-Implement Resource Management Security in Azure
Flash Card Module 10-Implement Resource Management Security in Azure
Yoong Seng Lai
Flash card architect network infra in azure
Flash card architect network infra in azure
Yoong Seng Lai
Recomendados
Flash card Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
Yoong Seng Lai
Flash Card- Architect Migration, Business Continuity and DR in Azure
Flash Card- Architect Migration, Business Continuity and DR in Azure
Yoong Seng Lai
Flash Card-Architect Compute Infrastructure in Azure
Flash Card-Architect Compute Infrastructure in Azure
Yoong Seng Lai
Flash card Module 12-Administer Container in Azure
Flash card Module 12-Administer Container in Azure
Yoong Seng Lai
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Flash card Module 8-Manage Identity and Access in Azure Active Directory
Yoong Seng Lai
Flash Card : Manage Resources in Azure
Flash Card : Manage Resources in Azure
Yoong Seng Lai
Flash Card Module 10-Implement Resource Management Security in Azure
Flash Card Module 10-Implement Resource Management Security in Azure
Yoong Seng Lai
Flash card architect network infra in azure
Flash card architect network infra in azure
Yoong Seng Lai
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Yoong Seng Lai
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Yoong Seng Lai
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Hayato Kiriyama
Flash card introduction to azure vm
Flash card introduction to azure vm
Yoong Seng Lai
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Securing AWS Environments
Securing AWS Environments
Ashish Kaushik
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
Amazon Web Services
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Amazon Web Services
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Amazon Web Services
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Amazon Web Services
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Amazon Web Services
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
OW2
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Amazon Web Services
Más contenido relacionado
La actualidad más candente
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Yoong Seng Lai
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Yoong Seng Lai
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Hayato Kiriyama
Flash card introduction to azure vm
Flash card introduction to azure vm
Yoong Seng Lai
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Securing AWS Environments
Securing AWS Environments
Ashish Kaushik
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
Amazon Web Services
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Amazon Web Services
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Amazon Web Services
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Amazon Web Services
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Amazon Web Services
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
La actualidad más candente
(20)
Evacuate Backup Data from Normal Repository to Dedup Appliance
Evacuate Backup Data from Normal Repository to Dedup Appliance
Flash card health monitoring of azure vm
Flash card health monitoring of azure vm
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
Flash card introduction to azure vm
Flash card introduction to azure vm
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Securing AWS Environments
Securing AWS Environments
Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Similar a Architect Infrastructure in Azure
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
OW2
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Amazon Web Services
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Amazon Web Services
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Amazon Web Services
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
Amazon Web Services
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Amazon Web Services
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Amazon Web Services
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon Web Services
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Amazon Web Services
Security in the cloud
Security in the cloud
Reham Maher El-Safarini
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
Amazon Web Services
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
Amazon Web Services LATAM
AWS Initiate: Security framework shakedown
AWS Initiate: Security framework shakedown
Amazon Web Services LATAM
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
AppDynamics
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
Amazon Web Services
Security and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
Kaseya
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Combell NV
Security hardening of core AWS services
Security hardening of core AWS services
Runcy Oommen
Control your cloud environment with AWS management tools
Control your cloud environment with AWS management tools
Amazon Web Services
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
Amazon Web Services
Similar a Architect Infrastructure in Azure
(20)
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Ready for hybrid cloud ? keep an eagle eye on configuration data - OW2con'19,...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Amazon CloudWatch (Container Insights)- AWS Container Day 2019 Barcelona
Security in the cloud
Security in the cloud
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate: Security framework shakedown
AWS Initiate: Security framework shakedown
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Thousands of JVMs, Hundreds of Applications, and Two People: How Cerner Learn...
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
Security and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Back-ups: Hoe ze je kunnen redden van een cyberaanval
Security hardening of core AWS services
Security hardening of core AWS services
Control your cloud environment with AWS management tools
Control your cloud environment with AWS management tools
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
Más de Yoong Seng Lai
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
Yoong Seng Lai
Flash card security-azure disk
Flash card security-azure disk
Yoong Seng Lai
Flash card managing using azure cli
Flash card managing using azure cli
Yoong Seng Lai
Flash card caching and performance in azure storage disk
Flash card caching and performance in azure storage disk
Yoong Seng Lai
Flash card azure disk
Flash card azure disk
Yoong Seng Lai
Flash card azure automation state
Flash card azure automation state
Yoong Seng Lai
Extending Availability to the Cloud
Extending Availability to the Cloud
Yoong Seng Lai
Business Continuity with Disaster Recovery
Business Continuity with Disaster Recovery
Yoong Seng Lai
Más de Yoong Seng Lai
(8)
Flash card architect storage infrastructure in azure
Flash card architect storage infrastructure in azure
Flash card security-azure disk
Flash card security-azure disk
Flash card managing using azure cli
Flash card managing using azure cli
Flash card caching and performance in azure storage disk
Flash card caching and performance in azure storage disk
Flash card azure disk
Flash card azure disk
Flash card azure automation state
Flash card azure automation state
Extending Availability to the Cloud
Extending Availability to the Cloud
Business Continuity with Disaster Recovery
Business Continuity with Disaster Recovery
Último
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Bernd Ruecker
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Mark Simos
2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Manik S Magar
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
Karmanjay Verma
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
Michael Gough
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
A Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
Ana-Maria Mihalceanu
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
Karmanjay Verma
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Kaya Weers
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Alkin Tezuysal
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Último
(20)
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
2024 April Patch Tuesday
2024 April Patch Tuesday
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
A Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Architect Infrastructure in Azure
1.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Flash Card – Architect Infrastructure Operation in Azure Prepared by Lai
2.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Resource Group Grouping By resources By environment By department
3.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Use Tag to organize resources Tag - Name/value pair For billing data Use Policies to enforce standard For monitoring Azure Policy – to create, assign & manage Create – Assignment- Secure resouces with RBAC Grant specific rights
4.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Use resource lock to protect resources Prevent mistaken deletion Block modification/ deletion Set Delete / Read only
5.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Policy
6.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Policy Focus on resource properties during deployment & already existing resources RBAC Focus on user action at different scopes Default Allow & Explicit deny Create Policy definition -> Assign definition to resources -> View result
7.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Management Group Container for managing access, policies & compliance across multiple Azure subscription
8.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor Monitor Service Health Comprehensive solution for collecting, analyzing & acting on telemetry Application Insight- monitor availability, performance & sage of web app Azure monitor for container – monitor performance of container workload Azure monitor for VM – monitor performance VM Visualize monitoring data 1. Dashboard 2. View 3. Power BI
9.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Service Health Monitor Service Health Provide personalized guidance & support when issue Azure Status – provide global view of the health state of Azure Services Service health – customizable dashboard that track the status of Azure services Resource Health – diagnose & obtain support when azure service issue affect resources
10.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Design Monitoring Strategy
11.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Security Center Manage security of your infra from centralized location
12.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Application Insight Monitor & manage the performance of your application Install package to monitor app & send log to Log Analytic workspace Use continuous monitoring gateway to monitor release pipeline Use availability test to monitor app performance after it’s live
13.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Sentinel Collect data on devices, user, infra & application Have data connector to monitor
14.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor Collecting metric & log data, combining & analyzing data from different sources
15.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Azure Monitor
16.
© 2019 Veeam
Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. Thank You
Descargar ahora