Azure Network Security Groups

An Azure network security group is your one stop shop for access control lists. Azure NSGs are how you will block or allow traffic from entering or exiting your subnets or individual virtual machines. In the new Azure Resource Manager Portal NSGs are applied to either a subnet or a virtual NIC of a virtual machine, and not the entire machine itself. NOTE: At the time of this post, Azure has a pair of Azure portals, including the classic portal where NSGs are applied to a virtual machine, or the Resource Manager Portal where NSGs are applied to a VNic of a virtual machine. ...

August 3, 2016 · 4 min · eshanks

Setup Azure Networks

Setting up networks in Microsoft Azure is pretty simple task, but care should be taken when deciding how the address space will be carved out. To get started lets cover a couple of concepts about how Azure handles networking. To start we have the idea of a “VNet” which is the IP space that will be assigned to smaller subnets. These VNets are isolated from each other and the outside world. If you want your VNet to communicate with another VNet or your on-premises networks, you’ll need to setup a VPN tunnel. You might be wondering, how do you do any segmentation between servers without having to setup a VPN then? The answer there is using subnets. Multiple subnets can be created inside of a VNet and security groups can be added to them so that they only allow certain traffic, sort of like a firewall does. ...

August 1, 2016 · 3 min · eshanks

Guide to Getting Started with Azure

Following the posts in order, this guide should help you to understand and get familiar with Microsoft Azure. This is a guide to getting started with Azure that you can build upon to deploy your own public cloud environment. Azure Accounts and Subscriptions Azure Active Directory Integration Azure Resource Groups Setup Azure Networks Azure Network Security Groups Create Azure VPN Connection Azure Storage Accounts Setup Azure PowerShell Azure Virtual Machine Deployment Azure Network Interfaces Azure Cloud Services Azure Scale Sets Understanding the Multiple Azure Portals Using Azure Automation Microsoft Azure Official Links Azure Resource Manager Portal - https://portal.azure.com Azure Classic Portal - http://manage.windowsazure.com Microsoft Azure Documentation and Resources - https://azure.microsoft.com ...

July 18, 2016 · 1 min · eshanks

Azure Resource Groups

An Azure resource group is a way for you to, you guessed it, group a set of resources together. This is a useful capability in a public cloud so that you can manage permissions, set alerts, built deployment templates and audit logs on a subset of resources. Resource groups can contain, virtual machines, gateways, VNets, VPNs and about any other resource Azure can deploy. Most items that you create will need to belong to a resource group but an item can only belong to a single resource group at a time. Resources can be moved from one resource group to another. ...

July 18, 2016 · 2 min · eshanks

Azure Subscriptions

Azure is a great reservoir of resources that your organization can use to deploy applications upon and the cloud is focused around pooling resources together. However, organizations need to be able to split resources up based on cost centers. The development team will be using resources for building new apps, as well as maybe an e-commerce team for production uses. Subscriptions allow for a single Azure instance to separate these costs, and bill to different teams. ...

July 11, 2016 · 3 min · eshanks

Microsoft Dynamic Access Control (Part 1)

Microsoft Dynamic Access Control is a new way to deploy access rules to your file shares. For many moons now, System Administrators have had a tedious task of managing tens, hundreds, or thousands of security groups to control how files are accessed. Groups of users have always needed to maintain different sets of security rules to prevent people from accessing confidential files. Human Resources obviously doesn’t want people outside their department to have access to personnel files, separate office locations may not want to share data with other offices in the same domain, and countries or cities might have different restrictions about sharing files with each other. ...

April 28, 2014 · 2 min · eshanks

Microsoft Dynamic Access Control (Part 2 - Claims)

In part 1 of the series we covered some generalities about Microsoft Dynamic Access Control and a few steps needed to prepare the domain and file servers. Now let’s look at creating claims. A claim is a user, device or resource property. A user in Active Directory will have properties such as Location, Department, manager, etc. Each of these properties is a claim but for any actions to be utilized by Direct Access, they have to be defined. ...

April 28, 2014 · 4 min · eshanks

Microsoft Dynamic Access Control (Part 3 – Resource Properties)

So far we’ve covered: Initial Setup of Dynamic Access Control Claims In this post we’ll look at Resource Properties. Resource Properties A resource property is a claim that describes the characteristics of an object in the file system. A claim is a descriptor of a user or a device whereas a resource property is a characteristic of a file or folder. As an example, we have a folder with HIPPA related information in it. A description can be added to this folder to indicate that it has Protected Health Information (PHI) contained in that folder. This PHI description is a resource property. ...

April 28, 2014 · 3 min · eshanks

Microsoft Dynamic Access Control (Part 4 – Rules and Policies)

We’ve discussed Initial configuration steps, Claims, and Resource Properties and we’re starting to see the power of Microsoft’s Dynamic Access Control, but we need a better way to manage these and that’s why we’ve come to “Rules and Policies”. A Central Access Rule can be used to take claims such as users in a department and match them up with permissions on a filefolder with specific resource properties. This is where the real power comes into play because now we don’t have to go through and map these for each individual file. We’re setting a general policy for the entire organization all at once. ...

April 28, 2014 · 4 min · eshanks

Microsoft Dynamic Access Control (Part 5 - Auto Classification)

In the first four parts of the Dynamic Access Control Series we covered Initial Configurations, Claims, Resource Properties and Rules Policies. These are working great in our environment but we still have to go through and manage the classification tags. Wouldn’t it be easier to have some files automatically tagged with a certain resource classification? Enter File Server Resource Manager to the rescue! Classification Rules From within File Server Resource Manager (FSRM) go to Classification Rules and choose to “Create Classification Rule…” ...

April 28, 2014 · 3 min · eshanks