Azure Security Training
  • 0. Getting Started
  • 1. Role Based Access Control
    • 1.1 User Account
    • 1.2 Group Creation
    • 1.3 Resource Group
    • 1.4 Assign Role
    • Cleanup
  • 2. Azure Policy
    • 2.1 Resource Group
    • 2.2 Allowed Locations Policy
    • 2.3 Verify Allowed Locations Policy
    • Cleanup
  • 3. Resource Manager Locks
    • 3.1 Resource Group with Storage Account
    • 3.2 ReadOnly lock on the storage account
    • 3.3 Test the ReadOnly lock
    • 3.4 ReadOnly lock and Delete Lock
    • 3.5 Delete Lock Testing
    • Cleanup
  • 4. Multi Factor Authentication
    • 4.1 Azure AD tenant
    • 4.2 Activate Azure AD Premium P2 trial
    • 4.3 Create Azure AD users and groups.
    • 4.4 Assign Azure AD Premium P2 licenses to Azure AD users
    • 4.5 Configure Azure MFA settings
    • 4.6 Validate MFA configuration
  • 5. Azure AD Conditional Access Policies
    • 5.1 Configure a conditional access policy
    • 5.2 Test the conditional access policy
  • 6 Azure AD Identity Protection
    • 6.1 View Azure AD Identity Protection
    • 6.2 User Risk Policy
    • 6.3 Sign-in Risk Policy
    • 6.4 Azure VM
    • 6.5 Simulate risk events
    • 6.6 Review the Azure AD Identity Protection reports
    • Cleanup
  • 7 Configure PIM Users & Roles
    • 7.1 Make a user eligible for a role
    • 7.2 Role to Require Approval
    • 7.3 User Permanent Assignment to a role
  • 8. Activate PIM roles with and without approval
    • 8.1 Role that does not require approval
    • 8.2 Role that requires approval
  • 9. Access Review and review PIM auditing features
    • 9.1 Security alerts for Azure AD
    • 9.2 Review PIM alerts
    • Cleanup
  • 10. Vnet Infra
    • 10.1 Virtual network with one subnet
    • 10.2 Application security groups
    • 10.3 ASG with Subnet
    • 10.4 NSG Rules
  • 11. VM with Network Filters
    • 11.1 Webserver
    • 11.2 VM Mgmt Server
    • 11.3 VM with ASG
    • 11.4 Testing
    • Cleanup
  • 12. Azure Firewall
    • 12.1 Deploy Lab
    • 12.2 Azure Firewall
    • 12.3 Default Route
    • 12.4 Application Rule
    • 12.5 Network Rule
    • 12.6 DNS Server
    • 12.7 Test the Firewall
    • Cleanup
  • 13. Azure Keyvault
    • 13.1 Resource Group
    • 13.2 KeyVault Configuration
    • 13.3 Add Key to KV
    • 13.4 Add Secret to KV
  • 14 Azure Monitoring
    • 14.1 Deploy VM
    • 14.2 Log Analytics Workspace
    • 14.3 Log Analytics for VM
    • 14.4 Collect Data
    • 14.5 View and Query Data
  • 15 Security Center
    • 15.1 Security Center Config
    • 15.2 Install Guest Config Extension
    • 15.3 SC JIT VM

More

  • Tags

  • Clear History

Built with from Grav and Hugo

Table of Contents > Tags

taxonomy :: Tags

  • Delete Lock
  • ReadOnly Lock
  • Resource Manager
  • Storage Account
  • Allowed Locations
  • Azure Policy
  • Policy Assignments
  • Resource Group
  • User Account
  • Users