New MSIX pre-recorded sessions – September 2020

This article is contributed. See the original author and article here.

Last week was the Microsoft Ignite 2020 digital event.  Along with the event we have a lot of new content on MSIX for IT Pros and developers.  Check out the new sessions below:

 

MSIX in the Enterprise – A state of the union for MSIX.  The MSIX platform is continuing to grow and adapting to customer needs. Let’s walk through what’s new in the past year for the MSIX platform and what it means for your enterprise.  We will also cover the plans upcoming for the MSIX platform.

 

Reduce developer friction with Azure Code Signing – Azure Code Signing is a service from Microsoft to enable developers and IT Pros to minimize the friction in code signing. The session will walk through the basics and importance of code signing and how Azure Code Signing will help reduce the challenges involved in signing your apps and code.

 

Using MSIX with CI/CD Pipelines for Code Changes – With MSIX and Azure DevOps you can go from making a code change in your repo to getting the updated release of your application on users’ machines in a matter of minutes. Join us for this demo-driven session as we demonstrate how to use MSIX CI/CD Pipelines to automate building, packaging, and deploying your desktop applications.

 

John Vintzel @jvintzel

Program Manager Lead, MSIX

 

New MSIX Pre-recorded sessions – Septemeber 2020

This article is contributed. See the original author and article here.

Last week was the Microsoft Ignite 2020 digital event.  Along with the event we have a lot of new content on MSIX for IT Pros and developers.  Check out the new sessions below:

 

MSIX in the Enterprise – A state of the union for MSIX.  The MSIX platform is continuing to grow and adapting to customer needs. Let’s walk through what’s new in the past year for the MSIX platform and what it means for your enterprise.  We will also cover the plans upcoming for the MSIX platform.

 

Reduce developer friction with Azure Code Signing – Azure Code Signing is a service from Microsoft to enable developers and IT Pros to minimize the friction in code signing. The session will walk through the basics and importance of code signing and how Azure Code Signing will help reduce the challenges involved in signing your apps and code.

 

Using MSIX with CI/CD Pipelines for Code Changes – With MSIX and Azure DevOps you can go from making a code change in your repo to getting the updated release of your application on users’ machines in a matter of minutes. Join us for this demo-driven session as we demonstrate how to use MSIX CI/CD Pipelines to automate building, packaging, and deploying your desktop applications.

 

John Vintzel @jvintzel

Program Manager Lead, MSIX

 

Azure Marketplace new offers – Volume 87

Azure Marketplace new offers – Volume 87

This article is contributed. See the original author and article here.

We continue to expand the Azure Marketplace ecosystem. For this volume, 82 new offers successfully met the onboarding criteria and went live. See details of the new offers below:

Applications

Ackee - Web Traffic Analytics on Ubuntu 18.04.png

Ackee – Web Traffic Analytics on Ubuntu 18.04: This image offered by Tidal Media contains Ackee on Ubuntu 18.04. Ackee delivers self-hosted web analytics, enabling you to analyze the traffic of your sites without being tracked. Ackee has an API and a web interface, and it strikes a good balance between analytics and privacy.

Advanced hMail Mail Server on Windows Server 2016.png

Advanced hMail Mail Server on Windows Server 2016: Specially hardened for Azure Marketplace, Tidal Media’s Advanced hMailServer image on Windows Server 2016 is fully configured for quick and easy deployment. It runs as a Windows service and supports IMAP, POP3, and SMTP email protocols.

Advanced hMail Mail Server on Windows Server 2019.png

Advanced hMail Mail Server on Windows Server 2019: Specially hardened for Azure Marketplace, Tidal Media’s Advanced hMailServer image on Windows Server 2019 is fully configured for quick and easy deployment. It runs as a Windows service and supports IMAP, POP3, and SMTP email protocols.

AhnLab CPP.png

AhnLab CPP: AhnLab CPP is a centralized cloud workload protection platform that focuses on providing optimized protection, unified management, and flexibility for workloads in hybrid environments. It uses IPS/IDS, application control, and antivirus functionalities to protect Windows and Linux servers.

Ampache - Music Streaming Server on Ubuntu 18.04.png

Ampache – Music Streaming Server on Ubuntu 18.04: This image from Tidal Media contains Ampache on Ubuntu 18.04. Ampache enables you to maintain a simple, secure, and fast web front end that runs on PHP. Access music and videos from anywhere with an internet-enabled device.

Arcserve Continuous Availability.png

Arcserve Continuous Availability: Powered by asynchronous replication technology, Arcserve Continuous Availability delivers automatic failover and data protection for Windows and Linux applications and systems on-premises and in the cloud.

AVEVA Unified Engineering.png

AVEVA Unified Engineering: Unified Engineering on Microsoft Azure provides end-to-end integration of conceptual and front-end engineering design (FEED) into an environment that handles all process simulation and engineering (1D, 2D, and 3D) from one data hub with bidirectional information flow.

AzuraCast - Web Radio Management Server on Ubuntu.png

AzuraCast – Web Radio Management Server on Ubuntu: This image offered by Tidal Media contains AzuraCast on Ubuntu. AzuraCast is an open-source web radio management suite. Get your radio station running in minutes, then manage your media, playlists, DJs, and more from a simple web interface.

C3 Thermal Scanning Solutions.png

C3 Thermal Scanning Solutions: Driven by artificial intelligence, Twayne Communications’ C3 thermal scanning solutions offer quick, effective, and contactless detection of COVID-19 symptoms. Scanners support HIPAA compliance and tested for safety, security, and accuracy.

ChainDoc.png

ChainDoc: Based on a private server blockchain network where only document hashes are saved, ChainDoc ensures documents’ content, form, and time of publication remain unchanged. Meet the challenge of communicating with customers via a durable medium by using Atende’s ChainDoc.

Checkingas.png

Checkingas: Checkingas on Microsoft Azure delivers visibility into fuel levels in propane and natural gas tanks. The solution also provides Microsoft Power BI dashboards that empower users to make data-driven decisions. This app is available only in Spanish.

Claim Genius Free Trial.png

Claim Genius Free Trial: Claim Genius uses AI to assess auto damage, determine whether to repair or replace damaged parts, and predict total loss based on photos, enabling insurance carriers to speed up claims processing and significantly reduce loss adjustment expenses.

CodingAi - Medical Coding Automation.png

Coding.Ai – Medical Coding Automation: Coding.Ai automates medical coding to help healthcare organizations cut costs and reduce administrative burdens. Decrease claim denials related to erroneous coding and gain greater insight into the coding process through a robust analytics dashboard with custom reporting.

Compliance Recording AI Analysis Microsoft Teams.png

Compliance Recording AI Analysis Microsoft Teams: AGAT Software Development’s SphereShield for Microsoft Teams performs audio and video analysis on recorded meetings for data-loss prevention and e-discovery needs. Featuring advanced AI and NLP analytics, SphereShield can transcribe audio to more than 70 languages.

Cosmos Forms Return to Work Offer.png

Cosmos Forms Return to Work Offer: Cosmos Forms’ Return to Work offer provides customers a rapidly deployable, easy-to-use mobile solution to screen and check in employees and visitors to support their organization’s return-to-work processes and protocols during the COVID-19 pandemic.

Covid-19 Workforce Wellness.png

Covid-19 Workforce Wellness: BroadReach Consulting’s COVID-19 Workforce Wellness solution on Microsoft Azure monitors the daily health of employees to help prevent the spread of COVID-19 at the workplace and beyond. Employees answer a simple five-question survey every day to be evaluated for infection.

CT-SAP-Chatbot.png

CT-SAP-Chatbot: Account Manager Bot is a smart chatbot that incorporates functionalities from SAP and Salesforce, enabling users to check on account receivables and invoices just by entering a client’s name rather than logging in to SAP and carrying out additional steps.

eDiscovery and Archiving for Microsoft Teams.png

eDiscovery and Archiving for Microsoft Teams: AGAT Software Development’s SphereShield for Microsoft Teams offers a next-generation archive and e-discovery solution that captures all content and makes it searchable via a variety of parameters.

Eventador Platform.png

Eventador Platform: Using SQL with Apache Flink, Eventador on Microsoft Azure provides data scientists and analysts with a robust platform for quickly and securely processing vast amounts of real-time and streaming data using simple data APIs.

Factory Insights as a Service.png

Factory Insights as a Service: Factory Insights as a Service is a SaaS-based cloud solution that allows manufacturers to improve the impact, speed, and scale of their digital transformation initiatives. PTC’s lean, accelerated approach vastly reduces setup, integration, and validation efforts.

Filezilla On Windows Server 2016.png

Filezilla On Windows Server 2016: Cognosys offers a hardened, enterprise-ready image of Filezilla on Windows Server 2016. Filezilla is a cross-platform graphical FTP, SFTP, and FTPS file management tool that helps users quickly move files between computers and web servers.

Filezilla On Windows Server 2019.png

Filezilla On Windows Server 2019: Cognosys offers a hardened, enterprise-ready image of Filezilla on Windows Server 2019. Filezilla is a cross-platform graphical FTP, SFTP, and FTPS file management tool that helps users quickly move files between computers and web servers.

FUJITSU Manufacturing Industry Solution COLMINA V2.png

FUJITSU Manufacturing Industry Solution COLMINA V2: COLMINA accelerates manufacturers’ digital transformation by implementing a three-layer structure that provides overall optimization of manufacturing processes via a cyberphysical system (CPS). This app is available only in Japanese.

Funkwhale - Music Sharing Server for Ubuntu 18.04.png

Funkwhale – Music Sharing Server for Ubuntu 18.04: Get rapid access to your favorite playlists, tracks, and artists with Tidal Media’s hardened image of Funkwhale on Ubuntu 18.04. Funkwhale is a community-driven project that lets you listen to and share music in an open, decentralized network.

GDS Collaboration Platform.png

GDS Collaboration Platform: The GDS Collaboration Platform from Samsung SDS facilitates collaboration and communication by using large, high-resolution GDS files (200+ GB) that include all related information. It supports various chip/mask layout formats and simultaneous visualization for multiple users.

Gift and Entertainment Registration.png

Gift & Entertainment Registration: Based on the Microsoft Power Platform, CSI Interfusion’s Gift & Entertainment Registration solution helps properly manage and maintain good employee-client relationships. It digitizes gift receipt, approval, and declaration processes to help prevent bribery and conflicts of interest.

Gitbucket - Plan Projects, Code, Test, and Deploy.png

Gitbucket – Plan Projects, Code, Test, and Deploy: Tidal Media’s image of Gitbucket, a web-based version control repository hosting service for source code and development projects, features a GitHub-like user interface, Git repository hosting via HTTP and SSH, a repository viewer, a wiki, and a plug-in system.

HR Onboarding Bridge to Office 365, Azure AD or AD.png

HR Onboarding Bridge to Office 365, Azure AD or AD: Aquera’s HR Onboarding Bridge imports employee information from human resource management system apps to Office 365, Active Directory, and Azure Active Directory. Automate hiring, terminations, rehires, and more with HR Onboarding Bridge.

ICONICS Suite 10.96.png

ICONICS Suite 10.96: ICONICS provides automation software solutions that visualize, historicize, analyze, and mobilize real-time information for any application on any device. ICONICS Suite 10.96 includes the GENESIS64, Hyper Historian, AnalytiX Suite, and MMX automation solutions.

iEdge.png

iEdge: Advantech’s iEdge drives effective equipment management for optimized productivity. It provides equipment connectivity with standard industrial protocol support (Modbus, OPC-UA, ODBC, etc.) and a user-friendly interface for equipment status monitoring and management.

InCyber TPIT - True prediction of insider threats.png

InCyber TPIT – True prediction of insider threats: InCyber’s True Prediction of Insider Threats (TPIT) solution on Microsoft Azure provides an ongoing risk ranking for all employees, contractors, consultants, and so on, enabling CEOs or CSOs to take preventive measures to avoid major losses to their organization.

Infosys SAP S4HANA - Intelligent Order Creation.png

Infosys SAP S/4HANA – Intelligent Order Creation: The SAP S/4HANA – Intelligent Order Creation solution uses the Azure Cognitive Services Form Recognizer to extract information from incoming documents, apply machine learning algorithms to it, and present data in the form of key-value pairs.

Inventory Count Auditing Application.png

Inventory Count Auditing Application: ISYX Technologies’ Inventory Count Auditing application helps organizations match their physical inventory count with the inventory availability in their ERP system. Ensure proper forecasting and better inventory management while reducing costs.

iSpring Suite Full Services Business License.png

iSpring Suite Full Services Business License: iSpring Suite on Microsoft Azure extends PowerPoint to allow for rapid e-course authoring, enabling users to easily develop quality courses, videos, lectures, and assessments that work on any device.

JetPatch 4.0.1.png

JetPatch 4.0.1: JetPatch provides end-to-end vulnerability remediation by automating the patch management process. Execute patch rollout workflows by endpoint groups and maintenance windows, and eliminate patch blind spots with discovery of devices, operating systems, and apps across your organization.

Localisation for Serbia.png

Localization for Serbia: This extension for Microsoft Dynamics 365 Business Central supports Serbian legal requirements, including VAT forms, VAT books (issued/received invoices), and more. The advanced pack features integration with banks, modified prepayment invoices, and credit memos.

LOMT Pool Testing.png

LOMT Pool Testing: Laboratory Optimizer for Mass Testing (LOMT) is laboratory software to manage COVID-19 pool testing. It allows a lab to test two to 30 as many people by reducing the quantity of assays, reagents, and time spent on each test.

Navidrome - Streaming Media Server on Ubuntu.png

Navidrome – Streaming Media Server on Ubuntu: This ready-to-run image from Tidal Media contains Navidrome on Ubuntu. Navidrome lets you stream your music from any browser or mobile device. Easily share your music and playlists with your friends and family.

Nodejs On Windows Server 2016.png

Nodejs On Windows Server 2016: This image offered by Cognosys contains Node.js on Windows Server 2016. Node.js is an open-source JavaScript runtime environment that executes JavaScript code outside a web browser.

Nodejs On Windows Server 2019.png

Nodejs On Windows Server 2019: This image offered by Cognosys contains Node.js on Windows Server 2019. Node.js is an open-source JavaScript runtime environment that executes JavaScript code outside a web browser.

OBS On Windows Server 2016.png

OBS On Windows Server 2016: This image offered by Cognosys contains OBS (Open Broadcaster Software) Studio on Windows Server 2016. OBS Studio is open-source software for video recording and live streaming that allows you to use native plug-ins for high-performance integrations or scripts written with Lua or Python.

Nodejs On Windows Server 2019.png

OBS On Windows Server 2019: This image offered by Cognosys contains OBS (Open Broadcaster Software) Studio on Windows Server 2019. OBS Studio is open-source software for video recording and live streaming that allows you to use native plug-ins for high-performance integrations or scripts written with Lua or Python.

OpeNgine DevOps Accelerator.png

OpeNgine DevOps Accelerator: OpeNgine, a DevOps accelerator for Microsoft Azure infrastructure and continuous integration/continuous delivery, offers out-of-the-box deployment architectures and integrations. Accomplish the full DevOps lifecycle with a smaller team, less expertise, less complexity, and higher margins.

Passport 360 - Client Package Transact.png

Passport 360 – Client Package Transact: Made for large-scale enterprises in high-risk environments, Passport 360 helps clients manage complex health and safety regulations, streamlining compliance and onboarding processes. Passport 360 integrates with the APIs of all major ERP, supply chain, safety, and HR applications.

Pritunl - Self-hosted VPN Server on Ubuntu 18.04.png

Pritunl – Self-hosted VPN Server on Ubuntu 18.04: This ready-to-run image offered by Tidal Media contains Pritunl on Ubuntu. Pritunl is an enterprise VPN server that allows you to virtualize your private networks across datacenters and provide local network access to remote users.

RetailHarvest.png

RetailHarvest: Through analytics and business intelligence, retailHARVEST reduces the loss of sales due to inventory shortages and reduces the cost of extra inventory due to poor distribution of products. This app is available in Spanish.

SaaS Cloud Based LMS iSpring Learn.png

SaaS Cloud Based LMS iSpring Learn: Move to virtual classrooms and deliver corporate training with iSpring Learn, an easy-to-use e-learning platform. iSpring Learn supports 11 languages, screen sharing, online meetings, reports in XLSX format, and more.

SenservaPro.png

SenservaPro: Made for Microsoft Azure administrators and Azure security auditors, the SenservaPro scanner locates security configuration concerns, ranks security risks, and helps you safeguard Office 365 migrations.

Smart Survey - feedback simplified and organized.png

Smart Survey – feedback simplified and organized: Make surveys more enjoyable for your customers with Smart Survey, which features status indicators and a hassle-free experience. Multidevice compatibility enables users to access Smart Survey from any device or platform, and dual input feedback helps you identify the quality of survey responses.

Sonerezh - Music Broadcasting Server for Ubuntu.png

Sonerezh – Music Broadcasting Server for Ubuntu: This image offered by Tidal Media contains Sonerezh on Ubuntu. Sonerezh is a self-hosted audio streaming application that lets users access their music from a web browser. Sonerezh features auto-transcoding to mp3 and automatic metadata extraction and file import.

Squid On Windows Server 2016.png

Squid On Windows Server 2016: This image offered by Cognosys contains Squid on Windows Server 2016. Squid is a content accelerator used by thousands of websites around the world to ease the load on their servers.

Squid On Windows Server 2019.png

Squid On Windows Server 2019: This image offered by Cognosys contains Squid on Windows Server 2019. Squid is a content accelerator used by thousands of websites around the world to ease the load on their servers.

Streama 1.9.1 - Media Streaming on LINUX Centos 7.png

Streama 1.9.1 – Media Streaming on LINUX Centos 7: Tidal Media offers a preconfigured, ready-to-run image of Streama 1.9.1 on CentOS 7. Streama is a powerful and easy-to-use streaming application and file manager, with features including a built-in media player, batch file operations, and media metadata.

SymbioSys eApplication-as-a-Service.png

SymbioSys eApplication-as-a-Service: SymbioSys eApplication-as-a-Service enables insurers to easily configure and customize electronic application forms for the needs of life, annuity, pension, and health insurance carriers, along with the necessary regulatory compliance.

SymbioSys Underwriting-as-a-Service.png

SymbioSys Underwriting-as-a-Service: Designed for global insurance underwriting needs, SymbioSys Underwriting-as-a-Service on Microsoft Azure improves your organization’s underwriting efficiency by facilitating informed decision-making for quick policy issuance.

Teradata Data Stream Controller VM.png

Teradata Data Stream Controller VM: The Teradata Data Stream Controller virtual machine provides administrative functions and metadata storage for the Data Stream Utility and is a key component of the backup and restore functionality of Teradata systems on Microsoft Azure.

timeghost.png

timeghost: Designed for Office 365, timeghost tracks project time and reminds users of all their daily Office 365 activities. timeghost is installed directly in Microsoft Teams and provides a feed that ensures users don’t forget even the smallest task.

Veso Media Server on Ubuntu 18.04 LTS.png

Veso Media Server on Ubuntu 18.04 LTS: This preconfigured image of Veso Media Server on Ubuntu 18.04 LTS from Tidal Media offers a quick and easy way to move your media storage to the cloud. The ad-free, open-source media server features media transcoding, a media player, and more.

Welch Allyn RetinaVue Care Delivery Model.png

Welch Allyn RetinaVue Care Delivery Model: The Welch Allyn RetinaVue care delivery model from Hillrom helps primary healthcare providers preserve the vision of patients living with diabetes and achieve the “triple aim” of healthcare: improved patient satisfaction, improved population health, and reduced per-capita costs.

Work Resumption Solution.png

Work Resumption Solution: Built on the Microsoft Power Platform, CSI Interfusion’s Work Resumption solution enables organizations to collect data for insights into employee health status, resource allocation, and more. Drive informed decision-making and keep workers safe during the COVID-19 pandemic.

Zegami Image Analysis and Annotation Transact.png

Zegami Image Analysis & Annotation: Transact: Zegami is an AI-enabled image analysis platform for scientific and medical imaging. It combines advanced analysis tools with a unique visualization interface, enabling users to rapidly categorize, label, and clean large image datasets.

Consulting services

Azure AI in a Day - 1 Day workshop.png

Azure AI in a Day – 1 Day workshop: In this workshop from FyrSoft, you’ll find out how to build machine learning models, bots, and AI-infused apps. You’ll also discover new ways to use Microsoft Azure AI, Azure Machine Learning, Azure Cognitive Search, and more.

Azure Cloud Adoption Discovery - 4 week Assessment.png

Azure Cloud Adoption Discovery – 4 week Assessment: Whether you’re looking to bring some in-house servers to the cloud or digitize paper-based processes, RedBit Development will determine how your organization can use Microsoft Azure to modernize and optimize your business.

Azure Cloud Migration- 1 wk Assessment.png

Azure Cloud Migration: 1 wk Assessment: Murdock Martin Consulting’s assessment, aligned with the Microsoft Cloud Adoption Framework for Azure, will provide a solid foundation for customers migrating enterprise workloads to Azure.

Azure Customer Data Platform 8-Week Workshop.png

Azure Customer Data Platform 8-Week Workshop: This engagement from Computer Enterprises Inc. will demonstrate how you can use Microsoft Azure to combine data ingestion, cleanup, storage, security, and big data analytics. Computer Enterprises Inc. will develop an initial custom data analytics product to prove immediate value.

Azure Governance CIE- 4 Hour Workshop.png

Azure Governance CIE: 4 Hour Workshop: Save money on your Microsoft Azure resources with TechStar Consulting Inc.’s workshop, which will focus on governance and security controls. You’ll learn about subscription management, cost governance, role-based access control, disaster recovery options, and more.

Azure Security Hardening- 2-week Implementation.png

Azure Security Hardening: 2-week Implementation: Team Venti’s packaged service for Microsoft Azure provides you with a streamlined and affordable way to harden your accounts against cybersecurity threats. Team Venti will use Azure Security Center to analyze your resources and identify vulnerabilities.

Azure Synapse Analytics - 1 Day Online Workshop.png

Azure Synapse Analytics – 1 Day Online Workshop: This workshop from CLOUD SERVICES is designed to get you started with Microsoft Azure Synapse, which brings together enterprise data warehousing and big data analytics. The workshop will contain theoretical and practical elements to help you solve tasks more efficiently.

Data Platform- 30 Days Implementation.png

Data Platform: 30 Days Implementation: Modernize your data estate with this implementation from FyrSoft. FyrSoft will assist customers in deploying and utilizing Azure data services so they can quickly build apps backed by Azure’s pre-built AI capabilities.

DevOps for Data Science- 3-Wk Implementation.png

DevOps for Data Science: 3-Wk Implementation: Using Microsoft Azure DevOps and Azure Machine Learning, Kapernikov will implement a DevOps pipeline that integrates with your industrial process. This will enable your engineers to automate testing and optimize processes through data science.

Form Recognizer 5-day PoC.png

Form Recognizer 5-day PoC: Use AI-powered form recognition to accelerate your business process optimization. Computer Enterprises Inc.’s proof of concept, which includes an assessment and a workshop, will show you how you can replace an unreliable optical character recognition (OCR) solution with Microsoft Azure Cognitive Services.

Holographic human capturing- 1-Day Workshop.png

Holographic human capturing: 1-Day Workshop: In this workshop from Volucap GmbH, you will learn about volumetric content, like holograms, and how you can start delivering mixed reality across mobile devices, headsets, PCs, and augmented reality platforms.

Modern Desktop Management- 5 days assessment.png

Modern Desktop Management: 5 days assessment: GFI will work with your IT and business teams to begin implementing Microsoft Azure technical architecture (Windows Virtual Desktop, Intune, and Azure Active Directory) in your Azure tenant. This service is available in French.

Modernise your Azure Data Platform- 2 Day Workshop.png

Modernize your Azure Data Platform: 2 Day Workshop: In this workshop, Data-Driven AI will consider your company’s current data estate and help you design a strategic roadmap to modernize your data platform on Microsoft Azure.

Remote Work Mgt and Cost Optimization 3-Day Assessment.png

Remote Work Mgt&Cost Optimization 3-Day Assessment: FyrSoft’s assessment will enable your enterprise to manage and secure your remote devices using Microsoft Azure. FyrSoft will convey how Microsoft technologies and services can be utilized for lean IT efficiency and infrastructure optimization.

SpaceHub Quickstart AZURE- 5 days assessment.png

SpaceHub Quickstart AZURE: 5 days assessment: Designed for the Netherlands market and available only in Dutch, PQR’s service helps organizations set up a Microsoft Azure landing zone. This will provide a solid basis for the expansion of Azure services and the implementation of cost management.

SQL Disaster Recovery Planning- 1 Day Assessment.png

SQL Disaster Recovery Planning: 1 Day Assessment: Minimize downtime with database replication to Microsoft Azure. TechStar Consulting Inc. will review your SQL Server or Azure database and design a solution to meet your service-level agreement and budget requirements.

SQL Server Health Check, CEO-5 Days Implementation.png

SQL Server Health Check, CEO-5 Days Implementation: ALESON ITC’s technical team will review your Microsoft Azure-based database system to improve performance and availability, check the licensing and the cost of your environment, and help you save money.

TeamsHub by Cyclotron for Non-Profits Offer.png TeamsHub by Cyclotron for Non-Profits Offer: Cyclotron’s special offer for nonprofits includes a two-day workshop and a 90-day trial of its TeamsHub solution to help drive Microsoft Teams adoption and training. Simplify your journey to Teams with Cyclotron.
Upskill As A Service 1-Hr Briefing.png

Upskill As A Service 1-Hr Briefing: Tech Mahindra Limited’s briefing will help your organization onboard employees, get technology training in place, track and achieve necessary certifications, and provide recommendations for future trainings.

Windows Azure Landing Zone - 1 Week Implementation.png

Windows Azure Landing Zone – 1 Week Implementation: In this engagement, Nexio will assist your organization in migrating on-premises servers to Microsoft Azure so you can meet your availability, agility, and scalability demands.

Windows Virtual Desktop WVD- 2-Wk Proof of Concept.png

Windows Virtual Desktop WVD: 2-Wk Proof of Concept: Because of COVID-19, many employees are working from home and companies are looking to provide a secure desktop environment. This proof of concept from Preeminent Solutions will help you plan your Windows Virtual Desktop deployment.

Vision AI Made Simple by New Azure IoT Central Template

Vision AI Made Simple by New Azure IoT Central Template

This article is contributed. See the original author and article here.

We just made building video analytics solutions simpler from edge to cloud with a new Azure IoT Central application template. This application template integrates Azure Live Video analytics video inferencing pipeline and OpenVINO™ AI Inference server by Intel® to build an end to end solution in a few hrs.

The number of IP cameras is projected to reach 1 billion (globally) by 2021. Traditionally, these types of cameras are used for security and surveillance. With the advent of video AI, businesses increasingly want to use their cameras to extract insights that help improve their profitability and automate (or semi-automate) their business processes. Such video analytics applied to live video streams help businesses react to real-time events and derive new business insights by observing trends over time.

Building a video analytics solution involves multiple complicated phases. This is relatively elaborate instrumentation that requires significant technical expertise and time. These solutions typically start with setting up new cameras or leveraging existing IP cameras for video traffic. IP cameras are versatile devices that support comprehensive configuration and management based on ONVIF standards. Once the IP cameras are set up, you need to ingest the video feeds, process the video, and prepare frames for analysis using inference servers that use specific AI models. These inference servers must be highly performant so that the solution can scale to dozens of cameras at any facility. The results from video analytics need to be collected and stored along with the relevant video for business applications to consume.

Using the new Azure IoT Central application template you can design, define, deploy, scale, and manage a live video analytics solution within hours. Video analytics template supports object and motion detection scenarios with key value propositions, as shown in the following illustration.

 

JorannaNg_0-1600904774943.png

 

Figure 1. Customer & Partner value proposition from Video Analytics – Object and Motion detection app template

 

In our mission to democratize video analytics, Microsoft and Intel collaborated to build end-to-end video analytics solutions using IoT Central. These solutions leverage:

  • Live Video Analytics on IoT Edge (LVA) to capture, record, and analyze live video. LVA is a platform for building AI-based video solutions and applications that include AI applications to live video. You can generate real-time business insights from live video streams, process data near the source to minimize latency and bandwidth requirements and apply the AI models of your choice. LVA provides a flexible programming model to design live video workflows and defines an extensibility model for integrating with inference servers. This frees you up to focus development efforts on the business outcome rather than setting up and operating a complex, live video pipeline.
  • For real-time analysis of live video feeds, the video pipeline leverages OpenVINO™ Model Server (OVMS), an inference server that’s highly optimized for AI vision workloads and developed for Intel® architectures. OVMS is powered by OpenVINO™ toolkit, a high-performance inference engine optimized for Intel® hardware on the Edge. An extension has been added to OVMS for easy exchange of video frames and inference results between the inference server and LVA, thus empowering you to run any OpenVINO™ toolkit supported model, and select from the wide variety of acceleration mechanisms provided by Intel® hardware. These include CPUs (Atom, Core, Xeon), FPGAs, VPUs.
  • Azure IoT Central is a platform for rapidly building enterprise-grade IoT applications on a secure, reliable, and scalable infrastructure. IoT Central simplifies the initial setup of your IoT solution and reduces the management burden, operational costs, and overhead of a typical IoT project. This enables you to apply your resources and unique domain expertise to solving customer needs and creating business value, rather than needing to tackle the mechanics of operating, managing, securing, and scaling a global IoT solution.

The IoT Central application template brings the goodness of Azure IoT Central, Live Video Analytics, and Intel components integration to enable building scalable solutions in a few hrs. as described in tutorials

 

JorannaNg_1-1600904774955.png

 

Figure 2. Block diagram of Video Analytics – Object and Motion Detection app template

 

The app template stitches the following components, 

  1. Cloud Services – IoT Central Video Analytics Application Template to stich the end-end solution & Azure Media Services for video snippet storage
  2. Edge Modules – Video processing pipeline (Live Video Analytics), hardware optimized OpenVINO™ AI Inference server by Intel, IoT Central gateway module to for protocol & identify translation of RTSP & Camera, RTSP Server (Live 555) for pre-recorded video strams
  3. Connecting & managing IP Camera, RTSP streams and AI module configuration

The IoT Central application template natively provides device operators view for object and motion detection scenarios, as shown in the following illustration.

 

 

JorannaNg_2-1600904774962.png

 

Figure 3. Dashboard from IoT Central template for Video Analytics – Object & Motion Detection

 

The dashboard in the new Video Analytics – Object & Motion Detection template for IoT Central is shown above. The template requires,

  1. IP cameras (any IP cameras that support RTSP on the ONVIF conformant products page devices that conform with profiles G, S, or T), or You can leverage simulated video stream that we ship as part of this template for demonstrations. 
  2. Linux server powered by your choice of Intel® acceleration technology (CPUs such as Atom, Core, Xeon, or FPGAs, or VPUs)
  3. Azure subscription to host relevant cloud services.

 

Don’t forget to check out the IoT Show episode  for application template details.  
ASK: Try out our comprehensive tutorial that will walk you through the creation of a Video Analytics solution in just a few hours.

 

Get started today

  1. You can use the new Video Analytics for Object & Motion Detection template to build and deploy your live video analytics solution.
  2. You can build Video Analytics solution within hours by leveraging Azure IoT Central, Live Video Analytics, and Intel.
  3. You can learn more about Live Video Analytics on IoT Edge here, and try out some of the other video analytics scenarios via the quickstarts and tutorials here. These show you how you can leverage open source AI models such as those in the Open Model Zoo repository or YOLOv3, or custom models that you have built, to analyze live video.
  4. You can learn more about the OpenVINO™ Inference server by Intel® in Azure marketplace  and its underlying technologies here. You can access developer kits to learn how to accelerate edge workloads using Intel®-based accelerators CPUs, iGPUs, VPUs and FPGAs. You can select from a wide range of AI Models from Open Model Zoo
Integrating Azure Web Application Firewall with Azure Sentinel

Integrating Azure Web Application Firewall with Azure Sentinel

This article is contributed. See the original author and article here.

Written in collaboration with @Chris Boehm and @aprakash13 

 

Introduction

 

Readers of this post will hopefully be familiar with both Azure Sentinel and Azure WAF. The idea we will be discussing is how to take the log data generated by WAF and do something useful with it in Sentinel, such as visualize patterns, detect potentially malicious activities, and respond to threats. If configured and tuned correctly (a topic for another post), Azure WAF will prevent attacks against your web applications. However, leaving WAF alone to do its job is not enough; security teams need to analyze the data to determine where improvements can be made and where extra action may be required on the part of response teams.

 

Send WAF Data to Sentinel

 

The first step to integrating these tools is to send WAF logs and other relevant data, such as access logs and metrics, to Sentinel. This process can be initiated using the built-in Sentinel Data Connector for Azure WAF:

Anthony_Roman_0-1601299630052.png

 

Once you have connected your WAF data sources to Azure Sentinel, you can visualize and monitor the data using Workbooks, which provide versatility in creating custom dashboards. Looking inside the Azure Sentinel Workbooks tab, look up the default Azure WAF Workbook template to get you started with all WAF data types.

 

Picture1.gif

 

When starting out with the Microsoft WAF Workbook, you’ll be faced with a few data filter options:

In the short annotation below, you’ll be taken through a few preconfigured filters, two different subscriptions (across two different tenants), while having preselected two different workspaces. The annotation is going to walk through a SQL Injection attack that was detected and how you can filter down the information by time or by event data. Like an IPAddress or Tracking ID provided by the diagnostic logs.

 

If you’re unfamiliar with a workbook, the design is a top to bottom filter experience. If you filter the top of the workbook, it’ll filter everything below with the selected filters above. You’ll see some filters that were not selected, example being “Blocked or Matched” within the logs, or the Blocked Request URI Addresses. Both could have been selected and filtered across the workbook.

 

WAFWorkbook3.gif

 

Hunting Using WAF Data

 

The core idea of Azure Sentinel is that relevant security regarding your hunting or investigation is produced in multiple locations/logs and being able to analyze them from a single point makes it easier to spot trends and see patterns that are out of the ordinary. The logs from our Azure WAF device is one critical part of this puzzle. As more and more companies move their applications to the cloud their Web Application security posture has become super relevant in their overall security framework. Through the WAF logs, we can analyze the application traffic and combine it with other data feeds to uncover various attack patterns that an organization needs to be aware of.

 

However, to be able to effectively use the telemetry from WAF, a general understanding of the WAF logs is critical.  It is very hard to focus on the hunting mission, be productive and effective if we don’t understand the data.  WAF data is collected in Azure Sentinel under the AzureDiagnostics table. Depending on whether the Azure WAF policy is applied to web applications hosted on Application Gateway or Azure Front Doors the category under which the logs are collected are a little different.

 

While we don’t cover this thoroughly in this post, WAF Policies can be applied to CDN; more information here. When applied to CDN, the relevant logs are under the category:

  • WebApplicationFirewallLogs (set on the WAF Policy)
  • AzureCdnAccessLog (set on the CDN Profile)

There are subtle and nuanced differences between both these log types (Application Gateway vs Front Door) however in general, when we talk about the Access Logs, they give us an idea about Application’s access patterns. The firewall logs on the other hand logs any request that matches a WAF rule through either detection or prevention mode of the WAF policy. These logs include a bunch of interesting information like the caller’s IP, port, requested URL, UserAgent and bytes in and out. The Azure Sentinel GitHub repository is a great source of inspiration for the kind of hunting and detection queries that one can build with some of these fields. However, let us go through a couple of examples of what we can do with this data.

 

One of the techniques that a lot of threat hunters have in their arsenal is count based hunting i.e. they aggregate the event data and look for events that crosses a particular threshold. For example, in the WAF data we could probably look for a number of sessions originating from a particular client IP address in a given interval of time. Once the number of connections exceeds a particular threshold value, an alert could be triggered for further investigation.

However, since each environment is different, we will have to modify the threshold value accordingly. Additionally, IP based session tracking have their own challenges and false positives due to various dynamic factors like Proxy/NAT etc. that we would have to be mindful of for these type of queries.

 

 

 

 

let Threshold = 200;  //Adjust the threshold to a suitable value based on Environment, Time Period.

let AllData =  AzureDiagnostics

| where TimeGenerated >= ago(1d)

| where Category in ("FrontdoorWebApplicationFirewallLog", "FrontdoorAccessLog", "ApplicationGatewayFirewallLog", "ApplicationGatewayAccessLog")

| extend ClientIPAddress = iff( Category in ("FrontdoorWebApplicationFirewallLog", "ApplicationGatewayAccessLog"), clientIP_s, clientIp_s);

let SuspiciousIP = AzureDiagnostics

| where TimeGenerated >= ago(1d)

| where Category in ( "ApplicationGatewayFirewallLog", "ApplicationGatewayAccessLog", "FrontdoorWebApplicationFirewallLog", "FrontdoorAccessLog")

| extend ClientIPAddress = iff( Category in ("FrontdoorWebApplicationFirewallLog", "ApplicationGatewayAccessLog"), clientIP_s, clientIp_s)

| extend SessionTrackingID = iff( Category in ("FrontdoorWebApplicationFirewallLog", "FrontdoorAccessLog"), trackingReference_s, transactionId_g)

| distinct  ClientIPAddress, SessionTrackingID

| summarize count() by ClientIPAddress

| where count_ > Threshold

| distinct ClientIPAddress;

SuspiciousIP

| join kind = inner ( AllData) on ClientIPAddress

| extend SessionTrackingID = iff( Category in ("FrontdoorWebApplicationFirewallLog", "FrontdoorAccessLog"), trackingReference_s, transactionId_g)

| summarize makeset(requestUri_s), makeset(requestQuery_s), makeset(SessionTrackingID), makeset(clientPort_d),  SessionCount = count() by ClientIPAddress, _ResourceId

| extend HostCustomEntity =  _ResourceId, IPCustomEntity = ClientIPAddress

 

 

 

 

Another way to leverage the WAF data could be through Indicators of Compromise (IoCs) matching. IoCs are data that associates observations such as URLs, file hashes or IP addresses with known threat activity such as phishing, botnets, or malware. Many organizations aggregate threat indicators feed from a variety of sources, curate the data and then apply it to their available logs. They could match these IoCs with their WAF logs as well. For more details check out this great blog post that talks about how you can import threat intelligence (TI) data into Azure Sentinel.  Once the TI data is imported in Azure Sentinel you can view it in the ThreatIntelligenceIndicator table in Logs. Below is a quick example of how you can match the WAF data with the TI data to see if there is any traffic that is originating from a Bot Network or from an IP that is known to be bad.

 

 

 

let dt_lookBack  = 1h;

let ioc_lookBack = 14d;

ThreatIntelligenceIndicator

| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()

| where Active == true

// Picking up only IOC's that contain the entities we want

| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)

// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.

// Taking the first non-empty value based on potential IOC match availability

| extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP)

| extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity)

| extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity)

| join (

AzureDiagnostics | where TimeGenerated >= ago(dt_lookBack)

| where Category in ( 'ApplicationGatewayFirewallLog', 'FrontdoorWebApplicationFirewallLog', 'ApplicationGatewayAccessLog', 'FrontdoorAccessLog')

| where isnotempty(clientIP_s) or isnotempty(clientIp_s)

| extend ClientIPAddress = iff( Category in ("FrontdoorWebApplicationFirewallLog", "ApplicationGatewayAccessLog"), clientIP_s, clientIp_s)

| extend WAF_TimeGenerated = TimeGenerated

)

on $left.TI_ipEntity == $right.ClientIPAddress

| project TimeGenerated, ClientIPAddress, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore,_ResourceId, WAF_TimeGenerated, Category, ResourceGroup, SubscriptionId, ResourceType,OperationName, requestUri_s, ruleName_s, host_s, clientPort_d,details_data_s, details_matches_s, Message, ruleSetType_s, policyScope_s

| extend IPCustomEntity = ClientIPAddress, HostCustomEntity = _ResourceId, timestamp = WAF_TimeGenerated, URLCustomEntity = requestUri_s

 

 

 

 

Threat hunters could even leverage KQL advanced modelling capabilities on WAF logs to find anomalies. For example, they could do the Time Series analysis on the WAF data. Time Series is a series of data points indexed (or listed or graphed) in time order. By analyzing time series data over an extended period, we can identify time-based patterns (e.g. seasonality, trend etc.) in the data and extract meaningful statistics which can help in flagging outliers. The different Thresholds would have to be adjusted depending on the environment.  

 

Below is an example query demonstrating Time Series IP anomaly.

 

 

 

let percentotalthreshold = 25;

let timeframe = 1h;

let starttime = 14d;

let endtime = 1d;

let scorethreshold = 5;

let baselinethreshold = 10;

let TimeSeriesData =  AzureDiagnostics

  | where Category in ( "ApplicationGatewayFirewallLog", "ApplicationGatewayAccessLog", "FrontdoorWebApplicationFirewallLog", "FrontdoorAccessLog") and action_s in ( "Log", "Matched", "Detcted")

  | where isnotempty(clientIP_s) or isnotempty(clientIp_s)

  | extend ClientIPAddress = iff( Category in ("FrontdoorWebApplicationFirewallLog", "ApplicationGatewayAccessLog"), clientIP_s, clientIp_s)

  | where TimeGenerated between ((ago(starttime))..(ago(endtime)))

  | project TimeGenerated, ClientIPAddress

  | make-series Total=count() on TimeGenerated from (ago(starttime)) to (ago(endtime)) step timeframe by ClientIPAddress;

let TimeSeriesAlerts=TimeSeriesData

  | extend (anomalies, score, baseline) = series_decompose_anomalies(Total, scorethreshold, 1, 'linefit')

  | mv-expand Total to typeof(double), TimeGenerated to typeof(datetime), anomalies to typeof(double),score to typeof(double), baseline to typeof(long)

  | where anomalies > 0 | extend score = round(score,2), AnomalyHour = TimeGenerated

  | project ClientIPAddress, AnomalyHour, TimeGenerated, Total, baseline, anomalies, score

  | where baseline > baselinethreshold;

  TimeSeriesAlerts

  | join (

      AzureDiagnostics

      | extend ClientIPAddress = iff( Category in ("FrontdoorWebApplicationFirewallLog", "ApplicationGatewayAccessLog"), clientIP_s, clientIp_s)

  | where isnotempty(ClientIPAddress)

  | where TimeGenerated  > ago(endtime)

  | summarize HourlyCount = count(), TimeGeneratedMax = arg_max(TimeGenerated, *), ClientIPlist = make_set(clientIP_s), Portlist = make_set(clientPort_d) by clientIP_s, TimeGeneratedHour= bin(TimeGenerated, 1h)

  | extend AnomalyHour = TimeGeneratedHour

  ) on ClientIPAddress

  | extend PercentTotal = round((HourlyCount / Total) * 100, 3)

  | where PercentTotal > percentotalthreshold

  | project  AnomalyHour, TimeGeneratedMax, ClientIPAddress, ClientIPlist, Portlist, HourlyCount, PercentTotal, Total, baseline, score, anomalies, requestUri_s, trackingReference_s, _ResourceId, SubscriptionId, ruleName_s, hostname_s, policy_s, action_s

  | summarize HourlyCount=sum(HourlyCount), StartTimeUtc=min(TimeGeneratedMax), EndTimeUtc=max(TimeGeneratedMax), SourceIPlist = make_set(ClientIPAddress), Portlist = make_set(Portlist) by ClientIPAddress , AnomalyHour, Total, baseline, score, anomalies, requestUri_s, trackingReference_s, _ResourceId, SubscriptionId, ruleName_s, hostname_s, policy_s, action_s

  | extend HostCustomEntity =  _ResourceId, IPCustomEntity = ClientIPAddress

 

 

 

 

Generate Incidents using Azure Sentinel Analytics

 

Azure Sentinel uses the concept of Analytics to accomplish Incident creation, alerting, and eventually automated response. The main piece of any Analytic rule is the KQL query that powers it. If the query returns data (over a configured threshold), an alert will fire. To use this in practice, you need to craft a query that returns results worthy of an alert.

 

The logic used can be complex, possibly adapted from the hunting logic outlined above, or fairly basic like the example below. It can be difficult to know what combination of WAF events warrant attention from analysts or even an automated response. We will assume the WAF has been tuned to eliminate most false positives, and that rule matches are usually indicative of malicious behavior.

 

The Analytic Rule we will look at serves the purpose of detecting repeated attacks from the same source IP address. We simply look for WAF rule matches, which amount to traffic being blocked with WAF in Prevention Mode, and count how many there have been from the same IP in the last 5 minutes. The thinking is that if a single source is repeatedly triggering blocks, they must be up to no good.

 

 

 

AzureDiagnostics

| where Category == "FrontdoorWebApplicationFirewallLog"

| where action_s == "Block"

| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by clientIP_s, host_s, _ResourceId

| where count_ >= 3

| extend clientIP_s, host_s, count_, _ResourceId

| extend IPCustomEntity = clientIP_s

| extend URLCustomEntity = host_s

| extend HostCustomEntity = _ResourceId

 

 

 

 

Notice that we are using entity mapping for the resource ID of the Front Door that blocked the requests; this becomes important when creating response actions with Playbooks. The full details of our example analytic can be seen in the screen capture below:

WAFAnalytic2.gif

 

With this Analytic active, any source IP address that generates 3 or more rule matches in 5 minutes will generate an alert and incident. A playbook will also be automatically triggered, which is covered in the next section.

 

Respond to Incidents with Playbooks

 

A Sentinel Playbook is what is used to execute actions in response to Incidents. Playbooks are mostly the same as Logic Apps, which are mostly the same as Power Automate. Sentinel Playbooks always start with the Sentinel trigger, which will pass dynamic content into the Logic App pipeline. Specifically, we are looking for the Resource ID of the Front Door (the Playbook also supports Application Gateway) in order to look up the information needed to perform the remediation actions.

 

From the example in the Analytics section, we have detected multiple WAF rule matches from the same IP address, and we want to block any further action this attacker attempts. Of course the attacker could just keep attempting to exploit the application from different IP addresses, as they often do, but automatically blocking each IP is a low effort method to make the payoff as difficult as possible.

 

The end goal of this Playbook is to create or modify a custom rule in a WAF Policy to block requests from a certain IP address. This is accomplished using the Azure REST API using the following broad steps:

  • Set variables and parse entities from the Incident
  • Check WAF type – Front Door or App Gateway
  • Get the associated WAF Policy
  • Read existing custom rules and store in an array
  • If an existing rule called “SentinelBlockIP” exists, add the attacking IP to the rule
  • If no rule exists yet, create a custom rule blocking the attacking IP
  • Re-assemble the WAF Policy JSON with the new or updated custom rule
  • Initiate a PUT request against the Azure REST API to update the WAF Policy

Here is what the Playbook looks like:

WAFPlaybook.gif

 

This playbook can be deployed from our GitHub repository.

 

To see everything we covered in this post and more in video format, check it out here.

 

It is our hope that you now have the tools and skills needed to take log data from Azure WAF and use it in Azure Sentinel to detect, investigate, and automatically respond to threats against your web applications.