- ABOUT US
- OUR SOLUTIONS
- MESSAGING & COLLABORATION
- CASE STUDIES
Today Microsoft Azure announced the Simplified restore experience for Azure virtual machines https://azure.microsoft.com/en-us/updates/simplified-restore-of-azure-vms/ Now we can restore an Azure VM directly with managed disks with a truly single-click operation. In addition, we can restore only the unmanaged disks to a storage account and the process will create a template for us to create the VM on a
Create an Ultra High Available on-prem <-> Azure VPN Connection At this post we will see how to make a high available connection between our on-premises network and Azure. This way we will have an Active-Active Dual-Redundancy VPN Connection. The idea behind this is that we have a router/firewall cluster,connected with two ISPs and we want
Save money following the Azure Advisor Recommendations Microsoft Azure has a very helpful service, called Azure Advisor. Think it like your personal advices on Azure services. Azure Advisor has many advices and recommendations about operations, availability, performance, security and cost. Following the Cost section of the Azure Advisor one can save a lot of money.
Have you tried the improved filtering and sorting Azure Portal Experience? Just “Try preview” Once you enable the Preview the new left sidebar will appear with all the sorting and filtering options. A very improved user experience. Check all the Octomber Azure Portal Updates at https://azure.microsoft.com/en-gb/blog/azure-portal-october-update/ The post Have you tried the improved filtering and sorting
Serverless Computing | Check your expired public certificates Check for expired public certificates serverless, using an Azure Function App. Magically run the required PowerShell script directly at the Portal without deploying VMs or App Services. At this post I combine Azure Function Apps, with a PowerShell script to check the certificate expirations and the Send-MailMessage
Azure Storage Advanced Thread Protection Azure Storage Advanced Threat Protection is a new security feature, currently in Preview. It monitors the Azure Blob Storage accounts. It detects anomalies and uncommon access to the Storage Account and notifies the admins through email. All the Azure Storage Advanced Threat Protection monitoring and logs are integrated to the
Connect two or more Azure Virtual Networks using one VPN Gateway Peering is a feature that allows to connect two or more virtual networks and act as one bigger network. At this post we will see how we can connect two Azure Virtual Networks, using peering and access the whole network using one VPN Gateway.
New UI for the Azure VM Creation Wizard Microsoft has revamped the UI around creating a new Azure VM. The information is now much more compact. Way less scrolling. And it’s easier to move along the dozens and dozens of options. Its not only about UI. You will see much more options available at the
Azure Backup | Enable backup alert notifications Azure Backup generates alerts for all backup events, such as unsuccessful backups. A new option is to create backup alert notifications so Azure Backup will alert you firing an email when an alert is generated. To enable the backup alert notifications, navigate to the “Backup Alerts” section of
Azure Portal | Virtual Machines bulk actions Azure Portal is a great GUI tool to administer all your Azure Resources and it continues evolving. Here is a very useful Tip. Did you know that you can manage Virtual Machines in bulk using the Azure Portal VIrtual Machines section? We have virtual machines bulk actions! Not only
Alice envisions the future, Athens August 27th – August 30th, 2018 This year I am honored to being part of such an inspiring event. Microsoft brought 160 girls, 60 teachers and topnotch speakers to a 4-day workshop with access to the latest tech, one unique Artificial Intelligence bootcamp: Alice envisions the future. Thank you girls
Application Security Groups to simplify your Azure VMs network security Application Security Groups helps to manage the security of the Azure Virtual Machines by grouping them according the applications that runs on them. It is a feature that allows the application-centric use of Network Security Groups. An example is always the best way to better