by Contributed | Sep 24, 2020 | Azure, Technology, Uncategorized
This article is contributed. See the original author and article here.
Join us to hear all about the great new features, announcements, and collaborations for Azure Data Explorer – Azure’s fast, fully- service for real-time analysis of telemetry big data streaming from apps, websites, IoT devices, and more.
One of Azure’s most used services and the foundation of Microsoft’s telemetry platform, Azure Data Explorer , combines broad data exploration and powerful analytical queries with lightning-fast interactivity.
Use Azure Data Explorer to:
- Monitor mission-critical systems.
- Analyze IoT data from thousands of devices.
- Explore and identify trends and anomalies in your data.
- Tune up customer experience.
- And many more exciting capabilities!
Join us to learn how to harness the growing volume of telemetry data to drive business success while keeping costs at bay with the super cost-efficient Azure Data Explorer service.
Capacity is limited to make sure to save your spot today!
Register to our online event to learn about the latest groundbreaking innovations, new features, and exciting collaborations.
The event includes a keynote by Rohan Kumar, CVP, Azure Data and fascinating content by the product group team members, delivering sessions on various topics. See the full agenda below.
Win a brand-new Surface Duo
In every session, one participant will win the newest Surface Duo from Microsoft.
Register now for a chance to enter the contest and win!
When: October 14th, 2020
Where: Wherever you are! The event will be streamed on Teams Live.
1st round: 09:00 BST (London Time)
2nd round: 09:00 PST (US Pacific Time)
Register Now
Agenda
Name
|
Description
|
Speakers
|
Duration (Min)
|
Opening Session
|
Opening words, brief overview of the agenda and service
|
Oded Sacher, Partner Group Manager
Uri Barash, Principal Group Program Manager
|
15
|
Re-imagine Telemetry Analytics, with Rohan Kumar
|
Join us to hear from Rohan Kumar, Corporate Vice President of Azure Data, about the exciting developments with Azure Data Explorer, Microsoft’s telemetry analytics platform that is powering Microsoft’s internal and external business
|
CVP, Azure Data, Rohan Kumar
|
30
|
|
|
|
|
What’s new with ADX
|
Updates on the latest and greatest in ADX ingestion, query, dashboards and more
|
Gabi Lehner, Program Manager Tzvia Gitlin Troyna, Program Manager
|
30
|
Powering Engineering Excellence With Azure Data Explorer
|
Taboola on AzureDataExplorer “It’s magic, interactive & intuitive. My users are in love”
|
Ariel Pisetzky, VP Information Technology & Cyber at Taboola.
|
15
|
Start Fast and Accelerate!
The next generation of the Kusto engine
|
Azure Data Explorer engine enhancements.
|
Evgeney Ryzhyk, Partner Software Engineer
Alexander Sloutsky, Principal Engineering Manager
Avner Aharoni, Principal Program Manager
|
30
|
|
|
|
|
Breakout Sessions– 30 minutes 11:30 – 12:00
All Breakout sessions are running in parallel at the end of Azure Data Explorer engine enhancements session
|
|
ADX overview
|
Azure Data Explorer is a big data interactive analytics platform for telemetry. Join this session to learn about ADX, where does it fit, when to use it, what are its key features, scenarios and customers
|
Uri Barash, Principal Group Program Manager
Minni Walia, Senior Program Manager
|
Enterprise Readiness
|
This session is about all the great features needed to run Azure Data Explorer at enterprise scale. We will cover security, business continuity, high availability CI/CD related details.
|
Henning Rauch, Senior Program Manager
Anagha Khanolkar, Principal Program Manager
|
ML, Time Series
|
Anomaly detection, forecasting, diagnostics & RCA for preventive maintenance in IIoT, cloud services and other markets. Training/scoring ML models in ADX using Python.
|
Adi Eldar, Principal Program Manager
Manoj Raheja, Principal Program Manager
Roy Ofer, Senior Data Scientist
|
Operating ADX optimally: Cost and performance
|
Choosing optimal SKU for your workload and utilizing auto-scale can significantly reduce your cluster cost. Join us for a deep dive session where we drill into the different cost reducing options.
|
Avner Aharoni, Principal Program Manager
Deepak Agrawal, Senior Program Manager
Guy Reginiano, Program Manager
|
Ingestion
|
In this session we will focus on ingestion methods, how to choose the right method to your customer scenario, and what are the available options
|
Vladik Branevich, Principal Engineering Manager Tzvia Gitlin Troyna, Senior Program Manager
|
Visualizing big data
|
Overcoming scale and performance challenges when building dashboards solution in big data scenarios
|
Gabi Lehner, Principal Program Manager Olga Goldenberg, Senior Program Manager
|
Please share and subscribe,
Azure Data Explorer
by Contributed | Sep 24, 2020 | Azure, Technology, Uncategorized
This article is contributed. See the original author and article here.
Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) is an on-premises implementation of the popular Azure Kubernetes Service (AKS) orchestrator, which automates running containerized applications at scale. AKS on Azure Stack HCI enables developers and admins to deploy and manage Linux and Windows containerized apps on Azure Stack HCI.
With AKS-HCI, enterprises can take advantage of consistent AKS experience across cloud and on-premises environments, extend to Azure with hybrid capabilities, run apps with confidence through built-in security, and use familiar tools to modernize Windows apps. For a more detailed overview of AKS-HCI capabilities, refer to this blog.
One of the core strengths of AKS-HCI is using security-first approach. At Microsoft, we believe that leading with strong security posture is table stakes for an enterprise-grade offering. Our security roadmap is comprehensive, starting with a mindset of placing strong protection guardrails and bolstering that with industry-hardened threat detection, and remediation and recovery. The protection-related hardening is built into AKS-HCI. To bring threat detection and remediation, and we integrate with security management systems such as Azure Security Center.

Figure 1. Securing AKS-HCI Deployment
In this blog, we will describe the security capabilities in AKS-HCI. These security features are not available in the current public preview version, but these and more will be released in the lead-up to general availability.
Secure image baseline and container protection
Microsoft provides a secure baseline for Windows and Linux container host images and services the updates of those images to maintain consistency and standards.

Figure 2. AKS-HCI implemented with hypervisor isolation
AKS-HCI is designed such that every layer is secure. The container host is deployed as a virtual machine. Each tenant cluster runs on its dedicated set of container hosts and uses the same strong Hyper-V-based isolation used in Azure which provides the strong kernel isolation among the container hosts.
In addition, AKS-HCI has multiple layers of protection built in. The first cluster to be bootstrapped is the management cluster, which is then used to bootstrap other tenant clusters. The container pods are run within Hyper-V virtual machines, enforcing strong isolation guarantees wherein the impact of a compromised container or pod is contained within the Hyper-V VM itself.
Identity and access management (IAM)
AKS-HCI integrates with Active Directory (AD), providing strong identity and facilitating seamless single sign-on (SSO) to manage the AKS-HCI environment and deploy the container workloads. Additionally, there is provision for Windows containerized application workloads to be bootstrapped with group Managed Service Account (gMSA) identity. gMSA is an AD-managed service account for which the passwords are automatically rotated.
Secure communication and secrets Management
Communication between the control plane components is protected by Transport Layer Security (TLS). AKS-HCI comes with zero-touch, out-of-the-box provisioning, and management of certificates for the infrastructure and Kubernetes built-in components. Additionally, the Kubernetes secrets are encrypted at rest using strong Advanced Encryption Standard (AES), with the ability to rotate the key encryption keys (KEK).
Integration with Azure security assets
AKS-HCI is integrated into the Microsoft security ecosystem, which allows extending Azure security constructs such as Azure Container Registry and Azure policies. In the future, integration with Azure assets like Azure Security Center will provide customers the ability to monitor for threats and offer pre- and post-runtime security assessments for both the infrastructure fabric and the Kubernetes cluster. This helps in monitoring for threats and keeping a strong security posture.
Join us in this journey
Security is a journey, not a destination. These are just some of the security features that we are working on and making generally available (GA) soon. AKS-HCI is going to be continually updated like a service. We will add more security features and continue to further harden the platform. Join us in this journey: we would love to hear feedback, experience, and insights on security. Be part of discussions in our Github repository.
by Contributed | Sep 24, 2020 | Azure, Technology, Uncategorized
This article is contributed. See the original author and article here.
Now more than ever, organizations are challenged with keeping their employees productive working remotely and interacting with their customers over digital channels. At the same time there has been an increase in evolving digital security threats as bad actors recognize an opportunity to disrupt your business. Moreover, security resources are stretched, and prioritization is important.
To help you protect all the assets within your organization earlier this week we announced Microsoft Defender. Microsoft Defender delivers comprehensive threat protection spanning users, devices, apps, data, servers, IoT devices, Operational Technology (OT), and more. Microsoft Defender is Microsoft’s leading Extended Detection and Response (XDR) solution for threat protection across all your technical assets composed of two experiences: Microsoft 365 Defender and Azure Defender. Azure Defender is an evolution of the threat protection technologies in Azure Security Center, protecting Azure and hybrid environments. With this announcement, we are rebranding the offerings previously called advanced threat protection services in Azure Security Center as Azure Defender. For example, Advanced Threat Protection for Azure Storage is now Azure Defender for Storage.
1. Updated Azure Security Center UI
Following this rebranding, and in order to better reflect the different value pillars that Azure Security Center offers, we have also changed the main Security Center product experience. With the new experience, Security Center serves as the central overarching experience that includes multiple independent cloud security pillars such as Azure Secure Score, Regulatory Compliance and of course Azure Defender. In addition, each of these pillars has its own dedicated dashboard allowing deeper insights and actions around that vertical. Changes to the product can be seen at the following link (http://aka.ms/ascignite2020) during the conference and will be integrated into the product after Ignite 2020.

Figure 1: Azure Security Center Overview window
When you click on the Azure Defender dashboard, you can see that you have better visibility into Azure Defender coverage across your different resource types, visibility into onboarding state & agent installation and a holistic view of the threat detection alerts included in Azure Defender.

Figure 2: Azure Defender dashboard
2. Protection for multi cloud workloads (AWS & GCP)
As more organizations manage cloud workloads on multiple cloud platforms, they require a security solution that provides visibility & protection across all their cloud environments. To enable that, Security Center is announcing a public preview for protection of workloads in AWS & GCP –
- Customers will be able to onboard their AWS/GCP accounts into ASC.
- Security Center will include detected misconfigurations and findings from AWS Security Hub and GCP Security Command Center into its Secure Score model and Regulatory Compliance experience, thus providing a central pane to visualize security posture across multi-cloud assets.
- Azure Defender for Servers will leverage Azure Arc to extend its support for VMs in AWS & GCP including capabilities such as automatic agent provisioning, policy management, vulnerability management, embedded EDR and more., embedded EDR and more.

Figure 3: Secure Score Recommendations page including AWS and GCP recommendations
We are also delighted to announce the preview availability of Azure Arc enabled SQL Servers and its integration with Azure Defender and Azure Sentinel. With Azure Arc enabled SQL Server you can now protect SQL Servers anywhere (on-premises, and in other clouds such as AWS, GCP) the same way you protect Azure SQL directly from the Azure portal for a unified, hybrid security experience using Azure Defender. This unified experience simplifies protecting your entire SQL estate. In addition, your security operations team can take the threat information from Azure Security Center and surface it into Azure Sentinel, the industry’s first cloud native SIEM, where when combined with security intelligence from throughout your enterprise, you can now detect and mitigate threats that may traverse laterally across your hybrid environments before attackers have the opportunity to exfiltrate data.

Figure 4. Integration of Azure Arc enabled SQL Server and Azure Security Center
3. Containers Enhancements
As containers and specifically Kubernetes are becoming more widely used, we are extending our Azure Defender for Kubernetes offering to include Kubernetes level policy management, hardening and enforcement with admission control to make sure that Kubernetes workloads are created secure by default. In addition, Container image scanning by Azure Defender for Container Registries will now support continuous scanning of container images in the Azure Container Registry and re-evaluate registry images for new vulnerabilities to minimize the exploitability of running containers.
4. General availability for more platform protection
We are announcing the general availability of Azure Defender for Key Vault and for Azure Defender for Storage protection for Azure Files and Azure Data Lake Storage Gen2.
5. Azure Defender for IoT, Now With CyberX Agentless Technology
At Ignite, we’re announcing Public Preview of new capabilities for securing Operational Technology (OT) environments such as manufacturing, building automation, life sciences, energy and water utilities, oil & gas, and warehousing & logistics.
Incorporating agentless technology from Microsoft’s recent acquisition of CyberX, Azure Defender for IoT enables organizations to auto-discover their IoT/OT assets, identify critical vulnerabilities, and continuously monitor for threats. It will initially be available for on-premises deployments, with an Azure-based console to follow. Read more.
Azure Security Center cloud security posture management enhancements
Azure Security Center continues to provide cloud security posture management enhancements. At Ignite this year, we are announcing general availability for the new Asset Inventory experience. The new experience enables customers to explore their security posture data in a much deeper way, providing view, filter and query abilities for all details and insights across all resources protected by ASC, via an easy to use and crystal clear user interface.
This new experience is fully built on top of Azure Resource Graph (ARG) which now holds all of ASCs security posture data, and leveraging its powerful KQL engine enables customers to quickly and easily reach deep insights on top of ASC data and cross reference with any other resource properties.

Figure 5: Azure Security Center Inventory view
We are also very excited to announce the public preview of a more fine-grained ability to manage and control security recommendations and their application on one’s resources. This includes ability to exempt specific resources from specific security recommendations, with documented reasoning and easy monitoring of exemptions. Another advanced capability is to customize security findings either by configuring which findings should be applicable, such as by severity, type, name or any other category. This allows maximum flexibility of adjusting the security recommendations to the organization’s policy and priorities and by that better representation of their security posture in Secure Score.
For related material, see the following articles:
by Contributed | Sep 24, 2020 | Azure, Technology, Uncategorized
This article is contributed. See the original author and article here.
Initial Update: Thursday, 24 September 2020 13:10 UTC
We are aware of issues within Application Insights and are actively investigating. Some customers may experience data access issue and issues with missed or delayed Log Search alerts in South UK and North Europe regions.
-
Work Around: None
-
Next Update: Before 09/24 15:30 UTC
We are working hard to resolve this issue and apologize for any inconvenience.
-Rama
by Contributed | Sep 24, 2020 | Uncategorized
This article is contributed. See the original author and article here.
Last week Microsoft released a new version of the Containers extension on Windows Admin Center. This release was focused on helping IT Admins getting their container hosts up and running without much effort.
The process of deploying the containers feature on Windows and Docker is actually well documented on our docs page – for both Windows 10 and Windows Server. However, installing the necessary components is just the first step you have to take to prepare your container host. So let’s take a look at what the process looks like on Windows Admin Center.
To get started, make sure you have the latest version of the Containers extension installed on your Windows Admin Center instance. To do that, go to the Extension Manager on the Windows Admin Center Settings and check for the Containers extension version 1.121.0:
If you don’t have the extension installed, you’ll see it under Available extensions. If you have a previous version of it installed you can check the Installed extensions tab and look for the update.
An important note here is that the previous version of this extension was available on the Windows Admin Center Insiders feed – which required some additional configuration. This is not a requirement anymore, as the new version is now available on the public feed.
Next, you can go the Windows Admin Center main page and target the server you want to deploy as a container host. Once you open the connection to the targeted server, you’ll see the Containers extension show up:

Once you click Install, Windows Admin Center will start the deployment of the Docker components as well as the container feature on Windows. This process might take a few moments to complete and will restart your server:

After the server restarts, you’ll be taken to the Windows Admin Center main page.

That’s it, no command line and PowerShell commands needed. However, there’s more to be done in order to run your first container. Let’s open the connection to the server again and open the Containers extension, then click on the Images tab:

As you can see, there are no images available to create new containers from. While you could go to the command line and simply pass on the image name you want to run, it will take a while to pull the layers needed to run that image. Since all Windows containers are created from the base container images, it’s probably a good idea to have those images already pulled for when you need it. to do that, click the Pull option:

Another great update to this extension is that now you have a list of the most common container images, including the base container images of Server Core and Nano Server. After you pull the images, the process of running new containers based on those images will be way faster.
I hope this blog post was useful and that will help you get started in using Windows Containers with Windows Admin Center. Let us know what you think in the comments or in our GitHub repo.
You can find on Twitter @vrapolinario.
Recent Comments