Save your spot at the Azure Data Explorer online event!

This article is contributed. See the original author and article here.

Join us to hear all about the great new features, announcements, and collaborations for Azure Data Explorer – Azure’s fast, fully- service for real-time analysis of telemetry big data streaming from apps, websites, IoT devices, and more.

 

 

One of Azure’s most used services and the foundation of Microsoft’s telemetry platform, Azure Data Explorer , combines broad data exploration and powerful analytical queries with lightning-fast interactivity.

 

Use Azure Data Explorer to:

  • Monitor mission-critical systems.
  • Analyze IoT data from thousands of devices.
  • Explore and identify trends and anomalies in your data.
  • Tune up customer experience.
  • And many more exciting capabilities!

Join us to learn how to harness the growing volume of telemetry data to drive business success while keeping costs at bay with the super cost-efficient Azure Data Explorer service.

 

Capacity is limited to make sure to save your spot today!

 

Register to our online event to learn about the latest groundbreaking innovations, new features, and exciting collaborations.

The event includes a keynote by Rohan Kumar, CVP, Azure Data and fascinating content by the product group team members, delivering sessions on various topics. See the full agenda below.

 

Win a brand-new Surface Duo

In every session, one participant will win the newest Surface Duo from Microsoft.
Register now for a chance to enter the contest and win! 

 

When: October 14th, 2020

Where: Wherever you are! The event will be streamed on Teams Live.

1st round: 09:00 BST (London Time)

2nd round: 09:00 PST (US Pacific Time)

 

Register Now

 

Agenda

Name

Description

Speakers

Duration (Min)

Opening Session

Opening words, brief overview of the agenda and service

Oded Sacher, Partner Group Manager

Uri Barash, Principal Group Program Manager

15

Re-imagine Telemetry Analytics, with Rohan Kumar

Join us to hear from Rohan Kumar, Corporate Vice President of Azure Data, about the exciting developments with Azure Data Explorer, Microsoft’s telemetry analytics platform that is powering Microsoft’s internal and external business

CVP, Azure Data, Rohan Kumar

30

       

What’s new with ADX

Updates on the latest and greatest in ADX ingestion, query, dashboards and more

Gabi Lehner, Program Manager
Tzvia Gitlin Troyna, Program Manager

30

Powering Engineering Excellence With Azure Data Explorer

Taboola on AzureDataExplorer “It’s magic, interactive & intuitive. My users are in love”

Ariel Pisetzky, VP Information Technology & Cyber at Taboola.

15

Start Fast and Accelerate! 

The next generation of the Kusto engine

 

Azure Data Explorer engine enhancements.

Evgeney Ryzhyk, Partner Software Engineer

Alexander Sloutsky, Principal Engineering Manager

Avner Aharoni, Principal Program Manager

 

 

30

 

 

 

 

Breakout Sessions– 30 minutes 11:30 – 12:00

All Breakout sessions are running in parallel at the end of Azure Data Explorer engine enhancements session

 

ADX overview

Azure Data Explorer is a big data interactive analytics platform for telemetry. Join this session to learn about ADX, where does it fit, when to use it, what are its key features, scenarios and customers

Uri Barash, Principal Group Program Manager

Minni Walia, Senior Program Manager

Enterprise Readiness

This session is about all the great features needed to run Azure Data Explorer at enterprise scale. We will cover security, business continuity, high availability CI/CD related details.

Henning Rauch, Senior Program Manager

Anagha Khanolkar, Principal Program Manager

 

ML, Time Series

Anomaly detection, forecasting, diagnostics & RCA for preventive maintenance in IIoT, cloud services and other markets. Training/scoring ML models in ADX using Python.

Adi Eldar, Principal Program Manager

Manoj Raheja, Principal Program Manager

Roy Ofer, Senior Data Scientist

Operating ADX optimally: Cost and performance

Choosing optimal SKU for your workload and utilizing auto-scale can significantly reduce your cluster cost. Join us for a deep dive session where we drill into the different cost reducing options.

Avner Aharoni, Principal Program Manager

Deepak Agrawal, Senior Program Manager

Guy Reginiano, Program Manager

Ingestion

In this session we will focus on ingestion methods, how to choose the right method to your customer scenario, and what are the available options

Vladik Branevich, Principal Engineering Manager
Tzvia Gitlin Troyna, Senior Program Manager

Visualizing big data

Overcoming scale and performance challenges when building dashboards solution in big data scenarios

Gabi Lehner, Principal Program Manager
Olga Goldenberg, Senior Program Manager

 

Please share and subscribe,

Azure Data Explorer

 

Security capabilities in Azure Kubernetes Service on Azure Stack HCI

Security capabilities in Azure Kubernetes Service on Azure Stack HCI

This article is contributed. See the original author and article here.

Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) is an on-premises implementation of the popular Azure Kubernetes Service (AKS) orchestrator, which automates running containerized applications at scale. AKS on Azure Stack HCI enables developers and admins to deploy and manage Linux and Windows containerized apps on Azure Stack HCI.

 

With AKS-HCI, enterprises can take advantage of consistent AKS experience across cloud and on-premises environments, extend to Azure with hybrid capabilities, run apps with confidence through built-in security, and use familiar tools to modernize Windows apps. For a more detailed overview of AKS-HCI capabilities, refer to this blog.

 

One of the core strengths of AKS-HCI is using security-first approach. At Microsoft, we believe that leading with strong security posture is table stakes for an enterprise-grade offering. Our security roadmap is comprehensive, starting with a mindset of placing strong protection guardrails and bolstering that with industry-hardened threat detection, and remediation and recovery. The protection-related hardening is built into AKS-HCI. To bring threat detection and remediation, and we integrate with security management systems such as Azure Security Center.

 

rahulverma_0-1600903582089.png

Figure 1. Securing AKS-HCI Deployment

 

In this blog, we will describe the security capabilities in AKS-HCI. These security features are not available in the current public preview version, but these and more will be released in the lead-up to general availability.

 

Secure image baseline and container protection

 

Microsoft provides a secure baseline for Windows and Linux container host images and services the updates of those images to maintain consistency and standards.

 

rahulverma_1-1600903582114.png

 

Figure 2. AKS-HCI implemented with hypervisor isolation

 

AKS-HCI is designed such that every layer is secure. The container host is deployed as a virtual machine. Each tenant cluster runs on its dedicated set of container hosts and uses the same strong Hyper-V-based isolation used in Azure which provides the strong kernel isolation among the container hosts.  

 

In addition, AKS-HCI has multiple layers of protection built in. The first cluster to be bootstrapped is the management cluster, which is then used to bootstrap other tenant clusters. The container pods are run within Hyper-V virtual machines, enforcing strong isolation guarantees wherein the impact of a compromised container or pod is contained within the Hyper-V VM itself.

 

Identity and access management (IAM)

 

AKS-HCI integrates with Active Directory (AD), providing strong identity and facilitating seamless single sign-on (SSO) to manage the AKS-HCI environment and deploy the container workloads. Additionally, there is provision for Windows containerized application workloads to be bootstrapped with group Managed Service Account (gMSA) identity. gMSA is an AD-managed service account for which the passwords are automatically rotated.

 

Secure communication and secrets Management

 

Communication between the control plane components is protected by Transport Layer Security (TLS). AKS-HCI comes with zero-touch, out-of-the-box provisioning, and management of certificates for the infrastructure and Kubernetes built-in components. Additionally, the Kubernetes secrets are encrypted at rest using strong Advanced Encryption Standard (AES), with the ability to rotate the key encryption keys (KEK).

 

Integration with Azure security assets

 

AKS-HCI is integrated into the Microsoft security ecosystem, which allows extending Azure security constructs such as Azure Container Registry and Azure policies. In the future, integration with Azure assets like Azure Security Center will provide customers the ability to monitor for threats and offer pre- and post-runtime security assessments for both the infrastructure fabric and the Kubernetes cluster. This helps in monitoring for threats and keeping a strong security posture.

 

Join us in this journey

 

Security is a journey, not a destination. These are just some of the security features that we are working on and making generally available (GA) soon. AKS-HCI is going to be continually updated like a service. We will add more security features and continue to further harden the platform. Join us in this journey: we would love to hear feedback, experience, and insights on security. Be part of discussions in our Github repository.

 

Ignite 2020 – Introducing Azure Defender in Azure Security Center

Ignite 2020 – Introducing Azure Defender in Azure Security Center

This article is contributed. See the original author and article here.

 

Now more than ever, organizations are challenged with keeping their employees productive working remotely and interacting with their customers over digital channels.  At the same time there has been an increase in evolving digital security threats as bad actors recognize an opportunity to disrupt your business.  Moreover, security resources are stretched, and prioritization is important.

 

To help you protect all the assets within your organization earlier this week we announced Microsoft Defender. Microsoft Defender delivers comprehensive threat protection spanning users, devices, apps, data, servers, IoT devices, Operational Technology (OT), and more.  Microsoft Defender is Microsoft’s leading Extended Detection and Response (XDR) solution for threat protection across all your technical assets composed of two experiences: Microsoft 365 Defender and Azure Defender.  Azure Defender is an evolution of the threat protection technologies in Azure Security Center, protecting Azure and hybrid environments.  With this announcement, we are rebranding the offerings previously called advanced threat protection services in Azure Security Center as Azure Defender.  For example, Advanced Threat Protection for Azure Storage is now Azure Defender for Storage.

 

1. Updated Azure Security Center UI

Following this rebranding, and in order to better reflect the different value pillars that Azure Security Center offers, we have also changed the main Security Center product experience. With the new experience, Security Center serves as the central overarching experience that includes multiple independent cloud security pillars such as Azure Secure Score, Regulatory Compliance and of course Azure Defender. In addition, each of these pillars has its own dedicated dashboard allowing deeper insights and actions around that vertical. Changes to the product can be seen at the following link (http://aka.ms/ascignite2020) during the conference and will be integrated into the product after Ignite 2020.

 

giladelyashar_10-1600959211945.png

 

Figure 1: Azure Security Center Overview window

 

When you click on the Azure Defender dashboard, you can see that you have better visibility into Azure Defender coverage across your different resource types, visibility into onboarding state & agent installation and a holistic view of the threat detection alerts included in Azure Defender.

 

giladelyashar_11-1600959211985.png

 

Figure 2: Azure Defender dashboard

2. Protection for multi cloud workloads (AWS & GCP)

As more organizations manage cloud workloads on multiple cloud platforms, they require a security solution that provides visibility & protection across all their cloud environments. To enable that, Security Center is announcing a public preview for protection of workloads in AWS & GCP

  • Customers will be able to onboard their AWS/GCP accounts into ASC.
  • Security Center will include detected misconfigurations and findings from AWS Security Hub and GCP Security Command Center into its Secure Score model and Regulatory Compliance experience, thus providing a central pane to visualize security posture across multi-cloud assets.
  • Azure Defender for Servers will leverage Azure Arc to extend its support for VMs in AWS & GCP including capabilities such as automatic agent provisioning, policy management, vulnerability management, embedded EDR and more., embedded EDR and more.

         giladelyashar_12-1600959211999.png

 

Figure 3: Secure Score Recommendations page including AWS and GCP recommendations

We are also delighted to announce the preview availability of Azure Arc enabled SQL Servers and its integration with Azure Defender and Azure Sentinel. With Azure Arc enabled SQL Server you can now protect SQL Servers anywhere (on-premises, and in other clouds such as AWS, GCP) the same way you protect Azure SQL directly from the Azure portal for a unified, hybrid security experience using Azure Defender. This unified experience simplifies protecting your entire SQL estate. In addition, your security operations team can take the threat information from Azure Security Center and surface it into Azure Sentinel, the industry’s first cloud native SIEM, where when combined with security intelligence from throughout your enterprise, you can now detect and mitigate threats that may traverse laterally across your hybrid environments before attackers have the opportunity to exfiltrate data.

 

giladelyashar_13-1600959212003.png

 

Figure 4. Integration of Azure Arc enabled SQL Server and Azure Security Center

 

3. Containers Enhancements

As containers and specifically Kubernetes are becoming more widely used, we are extending our Azure Defender for Kubernetes offering to include Kubernetes level policy management, hardening and enforcement with admission control to make sure that Kubernetes workloads are created secure by default. In addition, Container image scanning by Azure Defender for Container Registries will now support continuous scanning of container images in the Azure Container Registry and re-evaluate registry images for new vulnerabilities to minimize the exploitability of running containers.

 

4. General availability for more platform protection

 

We are announcing the general availability of Azure Defender for Key Vault and for Azure Defender for Storage protection for Azure Files and Azure Data Lake Storage Gen2. 

 

5. Azure Defender for IoT, Now With CyberX Agentless Technology

At Ignite, we’re announcing Public Preview of new capabilities for securing Operational Technology (OT) environments such as manufacturing, building automation, life sciences, energy and water utilities, oil & gas, and warehousing & logistics. 

Incorporating agentless technology from Microsoft’s recent acquisition of CyberX, Azure Defender for IoT enables organizations to auto-discover their IoT/OT assets, identify critical vulnerabilities, and continuously monitor for threats. It will initially be available for on-premises deployments, with an Azure-based console to follow. Read more.

 

 

Azure Security Center cloud security posture management enhancements

 

Azure Security Center continues to provide cloud security posture management enhancements. At Ignite this year, we are announcing general availability for the new Asset Inventory experience. The new experience enables customers to explore their security posture data in a much deeper way, providing  view, filter and query abilities for all details and insights across all resources protected by ASC, via an easy to use and crystal clear user interface.

This new experience is fully built on top of Azure Resource Graph (ARG) which now holds all of ASCs security posture data, and leveraging its powerful KQL engine enables customers to quickly and easily reach deep insights on top of ASC data and cross reference with any other resource properties.

 

giladelyashar_14-1600959212014.png

 

Figure 5: Azure Security Center Inventory view

 

We are also very excited to announce the public preview of a more fine-grained ability to manage and control security recommendations and their application on one’s resources. This includes ability to exempt specific resources from specific security recommendations, with documented reasoning and easy monitoring of exemptions. Another advanced capability is to customize security findings either by configuring which findings should be applicable, such as by severity, type, name or any other category. This allows maximum flexibility of adjusting the security recommendations to the organization’s policy and priorities and by that better representation of their security posture in Secure Score.

 

 

 

 

For related material, see the following articles:

 

 

 

Experiencing Data Access issue in Azure Portal for Many Data Types – 09/24 – Investigating

This article is contributed. See the original author and article here.

Initial Update: Thursday, 24 September 2020 13:10 UTC

We are aware of issues within Application Insights and are actively investigating. Some customers may experience data access issue and issues with missed or delayed Log Search alerts in South UK and North Europe regions.

  • Work Around: None
  • Next Update: Before 09/24 15:30 UTC

We are working hard to resolve this issue and apologize for any inconvenience.
-Rama


Step-by-Step: How to deploy a container host with Windows Admin Center

Step-by-Step: How to deploy a container host with Windows Admin Center

This article is contributed. See the original author and article here.

Last week Microsoft released a new version of the Containers extension on Windows Admin Center. This release was focused on helping IT Admins getting their container hosts up and running without much effort.

 

The process of deploying the containers feature on Windows and Docker is actually well documented on our docs page – for both Windows 10 and Windows Server. However, installing the necessary components is just the first step you have to take to prepare your container host. So let’s take a look at what the process looks like on Windows Admin Center.
 

To get started, make sure you have the latest version of the Containers extension installed on your Windows Admin Center instance. To do that, go to the Extension Manager on the Windows Admin Center Settings and check for the Containers extension version 1.121.0:
 

Sep2020-UpdateBlog Img04.png 

If you don’t have the extension installed, you’ll see it under Available extensions. If you have a previous version of it installed you can check the Installed extensions tab and look for the update.
 

An important note here is that the previous version of this extension was available on the Windows Admin Center Insiders feed – which required some additional configuration. This is not a requirement anymore, as the new version is now available on the public feed.
 

Next, you can go the Windows Admin Center main page and target the server you want to deploy as a container host. Once you open the connection to the targeted server, you’ll see the Containers extension show up:
 

DeployContainerHost01.png

 
Once you click Install, Windows Admin Center will start the deployment of the Docker components as well as the container feature on Windows. This process might take a few moments to complete and will restart your server:
 

DeployContainerHost02.png

After the server restarts, you’ll be taken to the Windows Admin Center main page. 

DeployContainerHost03.png

 
That’s it, no command line and PowerShell commands needed. However, there’s more to be done in order to run your first container. Let’s open the connection to the server again and open the Containers extension, then click on the Images tab:

DeployContainerHost04.png

 
As you can see, there are no images available to create new containers from. While you could go to the command line and simply pass on the image name you want to run, it will take a while to pull the layers needed to run that image. Since all Windows containers are created from the base container images, it’s probably a good idea to have those images already pulled for when you need it. to do that, click the Pull option:
 

Sep2020-UpdateBlog Img02.png

 
Another great update to this extension is that now you have a list of the most common container images, including the base container images of Server Core and Nano Server. After you pull the images, the process of running new containers based on those images will be way faster.

 

I hope this blog post was useful and that will help you get started in using Windows Containers with Windows Admin Center. Let us know what you think in the comments or in our GitHub repo.

You can find on Twitter @vrapolinario.