<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Jimi</title>
    <description>The latest articles on Forem by Jimi (@jimiog).</description>
    <link>https://forem.com/jimiog</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1564239%2Feb4314d7-d7f5-4224-9cad-25827cdc7add.png</url>
      <title>Forem: Jimi</title>
      <link>https://forem.com/jimiog</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/jimiog"/>
    <language>en</language>
    <item>
      <title>Starting Your Cloud Journey: Roles, Resources, and Realistic Expectations</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Sun, 01 Dec 2024 01:46:25 +0000</pubDate>
      <link>https://forem.com/jimiog/starting-your-cloud-journey-roles-resources-and-realistic-expectations-5gk7</link>
      <guid>https://forem.com/jimiog/starting-your-cloud-journey-roles-resources-and-realistic-expectations-5gk7</guid>
      <description>&lt;h3&gt;
  
  
  Starting Your Cloud Journey
&lt;/h3&gt;

&lt;p&gt;Over the past week, many people have reached out to me, curious about starting a career in the cloud and how to begin their journey. As someone who has recently started this journey myself, I understand the excitement and uncertainty that comes with exploring this field. These conversations inspired me to share my early experiences to encourage and guide those considering a career in cloud computing.&lt;/p&gt;

&lt;p&gt;In this post, I’ll discuss:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Finding your role in the cloud&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Educational resources to get started&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Setting realistic expectations&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fal118luxtiaqhninsnt3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fal118luxtiaqhninsnt3.jpg" alt="Finding Your Cloud Role" width="400" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Finding Your Role in the Cloud
&lt;/h3&gt;

&lt;p&gt;The cloud industry is vast, with roles that cater to different skills and interests. Do you enjoy meeting people, understanding their goals, and crafting solutions? Are you passionate about spotting patterns and anomalies? Or perhaps you love developing applications and scaling them globally?&lt;/p&gt;

&lt;p&gt;Each cloud role has unique responsibilities and focuses. Personally, I spent over a decade working in Client Solutions roles, where I honed my ability to understand objectives and provide tailored solutions. This background, combined with my education in IT, shaped my aspiration to pursue the Solutions Architect path. I enjoy visualizing business objectives, designing architectural diagrams, and guiding others through potential solutions.&lt;/p&gt;

&lt;p&gt;Identifying a cloud role that aligns with your skills and passions can make your journey in this field deeply fulfilling. Whether you gravitate toward designing infrastructure, managing operations, or developing applications, there’s a place for you in the cloud.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xczz4s699gt7uaef8m3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xczz4s699gt7uaef8m3.jpg" alt="Cloud Resources" width="400" height="400"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h3&gt;
  
  
  Educational Resources
&lt;/h3&gt;

&lt;p&gt;The modern age offers countless resources to learn cloud technologies—many of them free. Here are some I found particularly useful:  &lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Free Resources&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://aws.amazon.com/free/" rel="noopener noreferrer"&gt;Cloud Provider Learning Platforms&lt;/a&gt;&lt;/strong&gt;: Providers like AWS, Azure, and GCP offer free resources, labs, and tutorials to help you gain hands-on experience.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://explore.skillbuilder.aws/learn" rel="noopener noreferrer"&gt;AWS Skill Builder&lt;/a&gt;&lt;/strong&gt;: AWS's interactive learning paths and &lt;em&gt;Cloud Quest&lt;/em&gt; gamified challenges provide hands-on experience. When I started, these tools helped me master architectural concepts and implementation.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://roadmap.sh/" rel="noopener noreferrer"&gt;Developer Roadmaps&lt;/a&gt;&lt;/strong&gt;: This community-driven platform covers essential topics like networking, cloud design patterns, and DevOps fundamentals. It’s an excellent guide for building a learning plan.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://www.youtube.com" rel="noopener noreferrer"&gt;YouTube&lt;/a&gt;&lt;/strong&gt;: Don’t underestimate the wealth of tutorials and walkthroughs available on YouTube. When I built a trading card project using AWS Amplify, YouTube tutorials helped me navigate technologies like TypeScript, React.js, and Node.js.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Paid Resources&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://aws.amazon.com/certification/" rel="noopener noreferrer"&gt;Certifications&lt;/a&gt;&lt;/strong&gt;: Earning certifications like AWS Solutions Architect Associate deepens your understanding of cloud services and validates your skills.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bootcamps&lt;/strong&gt;: Bootcamps are especially useful for those who thrive in structured, intense learning environments. I attended a six-month bootcamp focused on Azure, where I earned credentials and built a cloud portfolio. Shoutout to my instructor and career coach &lt;a class="mentioned-user" href="https://dev.to/realcloudprojects"&gt;@realcloudprojects&lt;/a&gt;, who also taught me the art of professional blogging (hence, this post!).
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Higher Education&lt;/strong&gt;: While college isn’t the only path, it offers a structured environment to build valuable skills. My degree in Computer Science provided a strong foundation in programming and problem-solving.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3rb8rw3d90jgeowj16cu.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3rb8rw3d90jgeowj16cu.jpg" alt="Realistic Expectations" width="400" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Setting Realistic Expectations
&lt;/h3&gt;

&lt;p&gt;You may have heard, &lt;em&gt;“The cloud is not an entry-level role.”&lt;/em&gt; I certainly did. Many advised me to gain years of development or tech support experience before considering the cloud. But I was determined to make cloud computing my starting point.  &lt;/p&gt;

&lt;p&gt;Breaking into the cloud without extensive IT experience is possible but challenging. Many roles are mid- to senior-level, reflecting the responsibility of managing critical infrastructure. Some companies, however, do offer entry-level roles like Cloud Support Associate or Junior Cloud Engineer, which are great stepping stones into this field.&lt;/p&gt;

&lt;p&gt;With the industry’s rapid shift to hybrid and multi-cloud solutions, there’s never been a better time to start learning and pursuing opportunities in this space.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;A career in the cloud is achievable, even without years of prior experience. With the abundance of free and paid resources available, you can build the knowledge and confidence to succeed. Don’t let doubt hold you back—take the first step and begin your journey.  &lt;/p&gt;

&lt;p&gt;If you have questions or want to share your own journey, feel free to connect or comment below. Let’s inspire and learn from each other.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>azure</category>
      <category>googlecloud</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Managing Revisions in Azure Container Apps</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Wed, 18 Sep 2024 00:36:35 +0000</pubDate>
      <link>https://forem.com/jimiog/managing-revisions-in-azure-container-apps-1384</link>
      <guid>https://forem.com/jimiog/managing-revisions-in-azure-container-apps-1384</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this final guide of the series, we'll explore the essential aspect of managing revisions in Azure Container Apps. By effectively managing revisions, you can control the deployment of new features, roll back changes, and experiment with different versions of your application.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits of Revision Management&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Flexible Deployment:&lt;/strong&gt; Multiple revisions allow for gradual feature rollouts and experimentation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rollback Capability:&lt;/strong&gt; You can easily revert to a previous revision if issues arise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improved Control:&lt;/strong&gt; Managing revisions provides greater control over your application's behavior and updates.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Subscription:&lt;/strong&gt; An active Azure subscription.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Container Registry:&lt;/strong&gt; A container registry containing your container images.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Virtual Network and Subnets:&lt;/strong&gt; A virtual network with subnets for your container app and private endpoint.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Service Bus Namespace:&lt;/strong&gt; A Service Bus namespace for communication.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Managed Identity:&lt;/strong&gt; A user-assigned managed identity.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Private Endpoint:&lt;/strong&gt; A private endpoint connecting your container registry to your virtual network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Container App:&lt;/strong&gt; A deployed container app.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step-by-Step Guide&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Enable Multiple Revisions:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to your container app's settings.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ntzvl0dtf328samth43.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ntzvl0dtf328samth43.jpg" alt="Locating Container App"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Under "Application," go to "Revisions and replicas."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5zhbsjkr8qstsxegf8ye.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5zhbsjkr8qstsxegf8ye.jpg" alt="Locating Revisions and replicas"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Select "Choose Revision mode" and confirm the switch to "multi-revision mode."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu122sleq7y461vzy8chn.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu122sleq7y461vzy8chn.jpg" alt="Switching Revision mode"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create a New Revision:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click "+ Create a new revision."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fowgyz390jiaq9vltp957.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fowgyz390jiaq9vltp957.jpg" alt="Creating a new revision"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Provide a name/suffix and select your container image.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8mp6xm9lpcbzo4n4fk8h.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8mp6xm9lpcbzo4n4fk8h.jpg" alt="Configuring the revision"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Ingress Labels:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Under "Settings," select "Ingress."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdz1yniam7zwk3h38who8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdz1yniam7zwk3h38who8.jpg" alt="Changing the Ingress"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable ingress and configure the necessary settings (ingress traffic, type, client certificate mode, transport, insecure connections, and IP security restrictions).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuoiqe1m85jlkaj83poku.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuoiqe1m85jlkaj83poku.jpg" alt="Configuring the Ingress"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Traffic Percentage:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In the "Revisions and replicas" page, adjust the traffic percentage for each revision to control their distribution.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flr3ivzr3zb35hu43uvi6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flr3ivzr3zb35hu43uvi6.jpg" alt="Changing the Ingress percentage"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Congratulations! By following these steps, you've successfully configured revision management for your Azure Container App. This empowers you to manage different versions of your application, experiment with new features, and roll back changes if needed.&lt;/p&gt;

&lt;p&gt;By mastering the concepts of securing an Azure Container Registry, creating and configuring a secure container app, and effectively managing revisions, you've laid a strong foundation for building and deploying robust containerized applications on Azure. These essential components work together to ensure the security, performance, and flexibility of your container-based solutions.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>cloud</category>
      <category>container</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Creating and Configuring a Secure Container App in Azure Container Apps</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Wed, 18 Sep 2024 00:35:25 +0000</pubDate>
      <link>https://forem.com/jimiog/creating-and-configuring-a-secure-container-app-in-azure-container-apps-4e3k</link>
      <guid>https://forem.com/jimiog/creating-and-configuring-a-secure-container-app-in-azure-container-apps-4e3k</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the &lt;a href="https://dev.to/jimiog/securing-an-azure-container-registry-with-azure-container-apps-51ec"&gt;previous post&lt;/a&gt;, we discussed securing an Azure Container Registry with a private connection and role-based access. Now, we'll delve into creating and configuring a secure container app in Azure Container Apps. By leveraging the security measures we implemented in the previous post, we'll ensure that our container app operates in a controlled and protected environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits of Secure Container Apps&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Security:&lt;/strong&gt; By building upon the secure foundation of our container registry, we'll create a container app that is protected from unauthorized access and potential threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improved Performance:&lt;/strong&gt; Leveraging private endpoint connections and optimized network configurations can enhance the performance and reliability of our container app.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Simplified Management:&lt;/strong&gt; Azure Container Apps provides a managed service, reducing the operational overhead and complexity of managing containerized applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before you begin, ensure you have the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Subscription:&lt;/strong&gt; An active Azure subscription.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Azure Container Registry (ACR):&lt;/strong&gt; A container registry containing your container images.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Virtual Network and Subnets:&lt;/strong&gt; A virtual network with at least two subnets: one for the private endpoint and another for the container app.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Service Bus Namespace:&lt;/strong&gt; A Service Bus namespace for communication between the container app and external services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;User-Assigned Managed Identity:&lt;/strong&gt; A managed identity associated with your container registry.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Private Endpoint:&lt;/strong&gt; A private endpoint connecting your container registry to your virtual network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step-by-Step Guide&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create a Container App:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to the Azure Portal and search for "Container App."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkw06wnvbayfsj2qilnu.jpg" alt="Searching for Container Apps"&gt;
&lt;/li&gt;
&lt;li&gt;Click on "Create" and provide the necessary details (resource group, container app name, and region). Once complete, click on "Create new" underneath "Container Apps Environment."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzuwtcfi5309ileyenqfb.jpg" alt="Configuring Container App"&gt;
&lt;/li&gt;
&lt;li&gt;In the "Networking" tab, select "Use your own virtual network" and choose the subnet for your container app. Click "Create" at the bottom.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ugd9k3dld1nb3waoy61.jpg" alt="Configuring Container Apps Environment"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Container App Image:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Select "Azure Container Registry" as the image source.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqdji4letwq8b9s4og9hr.jpg" alt="Reviewing the Container App"&gt;
&lt;/li&gt;
&lt;li&gt;Choose your container registry and image. Click "Review + create" at the bottom.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Authenticate with Managed Identity:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After deployment, navigate to your container app's settings and select "Identity" under "Settings".
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzomno00kb9q26bo6tsd7.jpg" alt="Finding Identity"&gt;
&lt;/li&gt;
&lt;li&gt;Under the "User Assigned" tab click "+Add" and add the managed identity you created earlier.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffv1afhg9qag7mw81muaz.jpg" alt="Assigning a user assigned managed identity"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Service Bus Connection:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Under "Settings" select "Service Connector (Preview)" and click "+Create."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz5a7kcj8s3ikr8j2x30z.jpg" alt="Navigating to Service Connector"&gt;
&lt;/li&gt;
&lt;li&gt;Select "Service Bus" as the service type and choose the appropriate client type. 
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgbr4fxezm2qpnh8ghhwy.jpg" alt="Configuring the Service Bus connection"&gt;
&lt;/li&gt;
&lt;li&gt;In "Authentication" select the user-assigned managed identity.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa8u21dozirgggjek1767.jpg" alt="Selecting User assigned managed identity"&gt;
&lt;/li&gt;
&lt;li&gt;Continue until the end then review and create the Service Connection.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure HTTP Scale Rules:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Under "Application," go to "Scale."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffjo6n432uuo7ip2t9zrk.jpg" alt="Finding Scale"&gt;
&lt;/li&gt;
&lt;li&gt;In the "Scale" section, configure minimum and maximum replicas then click "Add" under "Scale rule."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd4anrzsrfbrtlaa1xhc1.jpg" alt="Configuring Scale rule"&gt;
&lt;/li&gt;
&lt;li&gt;Create a name for the scaling rule and select the "HTTP scaling" Type. Decide an amount of concurrent requests for the rule.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa23bbas2m4vfknpcgegi.jpg" alt="Creating HTTP Scale rule"&gt;
&lt;/li&gt;
&lt;li&gt;Click on "Save as new revision" on the bottom.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2iywcfrmc2n1vood7xuf.jpg" alt="Saving the revision"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Congratulations! You've successfully created and configured a secure container app in Azure Container Apps. By leveraging the security measures implemented in our previous post, we've ensured that our container app is protected from unauthorized access and operates efficiently. This provides a strong foundation for building and deploying secure, scalable containerized applications on Azure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the next guide, we'll look at using Azure Pipelines to handle continuous integration for your Azure Container Apps.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>containers</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Securing an Azure Container Registry with Azure Container Apps</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Wed, 18 Sep 2024 00:27:39 +0000</pubDate>
      <link>https://forem.com/jimiog/securing-an-azure-container-registry-with-azure-container-apps-51ec</link>
      <guid>https://forem.com/jimiog/securing-an-azure-container-registry-with-azure-container-apps-51ec</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In today's cloud-native landscape, ensuring the security of container registries is paramount. This post will guide you through the process of configuring a secure connection between your Azure Container Registry (ACR) and Azure Container Apps. By implementing user-assigned managed identities and private endpoint connections, you'll significantly enhance the security of your container deployments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits of Secure Connection&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Reduced Attack Surface:&lt;/strong&gt; Private endpoint connections limit access to your ACR to only the authorized resources within your virtual network, minimizing the risk of unauthorized access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Compliance:&lt;/strong&gt; Implementing role-based access control (RBAC) using managed identities aligns with industry best practices and helps meet compliance requirements.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improved Security Posture:&lt;/strong&gt; By restricting access and applying appropriate permissions, you can strengthen the overall security of your container environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before you begin following the steps outlined in this post, ensure you have the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Subscription:&lt;/strong&gt; An active Azure subscription is required to create and manage resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Azure Container Registry (ACR):&lt;/strong&gt; A container registry containing your container images.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Virtual Network and Subnet:&lt;/strong&gt; A virtual network with a subnet where you'll create the private endpoint.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Service Bus Namespace (Optional):&lt;/strong&gt; If you plan to use Service Bus integration with your Container Apps, you'll need a Service Bus namespace.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step-by-Step Guide&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create a User-Assigned Managed Identity:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to the Azure Portal and search for "Managed Identity."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7yt24w9bl7bvehht5ch.jpg" alt="Searching Managed Identites"&gt;
&lt;/li&gt;
&lt;li&gt;Click on "Create" and provide the necessary details (resource group, region, and name).
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fctpb33wa2v8hf7x151e2.jpg" alt="Create Managed Identity"&gt;
&lt;/li&gt;
&lt;li&gt;Review and create the identity.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5kkevbz2mczxqhbf5nee.jpg" alt="Configuring the User Managed Identity"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Grant AcrPull Permissions to the Managed Identity:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open your ACR resource in the Azure Portal.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1sijxikbvnqryi0b4343.jpg" alt="Clicking the Container Registry"&gt;
&lt;/li&gt;
&lt;li&gt;Go to "Access Control (IAM)" and click "+ Add."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feb46owvfpj7p5yr71oez.jpg" alt="Setting Access Control"&gt;
&lt;/li&gt;
&lt;li&gt;Select "Add Role Assignment."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj45kd700rhqzzad7zek7.jpg" alt="Adding Role Assignment"&gt;
&lt;/li&gt;
&lt;li&gt;Search for and select the "AcrPull" role.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiqxymb7wqjjchp3k7ru3.jpg" alt="Assigning AcrPull role"&gt;
&lt;/li&gt;
&lt;li&gt;Assign the role to your user-assigned managed identity.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fax41symwm8omk4rfvr2n.jpg" alt="Selecting User Assigned Identity"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure a Private Endpoint Connection:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In your ACR resource, select "Networking" underneath "Settings"
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F84msy33iy1kchnp2ow69.jpg" alt="Finding the Networking setting"&gt;
&lt;/li&gt;
&lt;li&gt;Select the "Private Access" tab and click "Create a private endpoint connection."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F90ijpxwft74xubyewcwi.jpg" alt="Creating Private Endpoint Connection"&gt;
&lt;/li&gt;
&lt;li&gt;Provide the necessary details for your endpoint.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh8yefl6wkc9we4cx6c0s.jpg" alt="Configuring private endpoint"&gt;
&lt;/li&gt;
&lt;li&gt;Ensure the "Target Sub-resource" is set to "registry."
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9hemnt0162lb1rbyo7bs.jpg" alt="Setting the Target sub-resource"&gt;
&lt;/li&gt;
&lt;li&gt;Select your virtual network and subnet.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faay7y1fjrzkaobnecezd.jpg" alt="Configuring the virtual network"&gt;
&lt;/li&gt;
&lt;li&gt;Enable private DNS integration.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmaw32gpam2cll3166wf.jpg" alt="Enable private DNS zone"&gt;
&lt;/li&gt;
&lt;li&gt;Review and create the private endpoint.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Congratulations! You've successfully established a secure connection between your Azure Container Registry and Azure Container Apps. The combination of user-assigned managed identities and private endpoint connections provides a robust security posture for your container deployments. This ensures that only authorized entities can access your container images, reducing the risk of unauthorized access and data breaches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps&lt;/strong&gt;&lt;br&gt;
In the &lt;a href="https://dev.to/jimiog/creating-and-configuring-a-secure-container-app-in-azure-container-apps-4e3k"&gt;next guide&lt;/a&gt;, we'll delve into creating and configuring a container app using Azure Container Apps.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>containers</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Configuring Azure Arc-Enabled Windows Servers with Azure VM Extensions</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Thu, 15 Aug 2024 22:15:58 +0000</pubDate>
      <link>https://forem.com/jimiog/configuring-azure-arc-enabled-windows-servers-with-azure-vm-extensions-him</link>
      <guid>https://forem.com/jimiog/configuring-azure-arc-enabled-windows-servers-with-azure-vm-extensions-him</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;In our final guide for the &lt;a href="https://dev.to/jimiog/managing-azure-arc-enabled-windows-server-updates-by-using-azure-update-manager-4bmp"&gt;series&lt;/a&gt; we'll walk through the process of configuring Azure Arc-enabled Windows servers using an Azure VM extension. We'll cover essential steps like installing IIS and blocking the legacy Azure Log Analytics agent. Whether you're a system administrator new to Azure Arc or looking to refine your configuration, this post will provide valuable insights.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step-by-Step Guide
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Installing IIS
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Log into your Windows VM:&lt;/strong&gt; Establish a Remote Desktop connection to your Windows VM.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Open PowerShell ISE:&lt;/strong&gt; Launch Windows PowerShell Integrated Scripting Environment (ISE) with administrative privileges.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvdacsev23cc4r75bn2tx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvdacsev23cc4r75bn2tx.jpg" alt="Locating Powershell ISE"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create the installation script:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Paste the following script into PowerShell ISE:
```powershell
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Install-WindowsFeature -name Web-Server -IncludeManagementTools&lt;br&gt;
   Remove-Item -Path 'C:\inetpub\wwwroot\iisstart.htm'&lt;br&gt;
   Add-Content -Path 'C:\inetpub\wwwroot\iisstart.htm' -Value "$env:computername"&lt;/p&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;    ![Pasting script in powershell](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l6p89wdoaukh6945hiul.jpg)* Save the script as `Install_IIS.ps1` in your Documents folder.

    ![Pasting the script into a text document](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4960rvls374s7cm5e5y6.jpg)

4. **Create an Azure storage account:**
   * Navigate to the Azure portal and create a new storage account.

    ![Locating storage account](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z3726rfrod35bteo5zah.jpg)
   * Configure the storage account with your Subscription, Resource Group, and create a globally unique name.
   * Select Locally Redundant Storage (LRS) for redundancy and click "Review + Create".

    ![Configuring Storage Account](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/taynx0kfx1b66483gpci.jpg)
5. **Create a storage container:**
   * Within the storage account, click on "Container" to create a folder for the script.

    ![Creating Storage Container](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/v4zlv4hkdbfme5ljdknb.jpg)
   * Click on "+ Container"

    ![Creating the storage container](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pemkxohn153jau1hti54.jpg)
   * Create a name for the storage container then click on "Create"
    ![Creating the container](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xtcmi61pvc3mqoko5k80.jpg)
6. **Upload the script:**
   * Upload the `Install_IIS.ps1` script to the created storage container.
    ![Clicking upload](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4stqpzxlg98g5ry3rx1t.jpg)
    ![Uploading the created script](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r28vqnex3jve3audvmdj.jpg)

7. **Configure the Azure VM extension:**
   * In the Azure portal, navigate to your Azure Arc-enabled machine.
   * Underneath "Settings" click on "Extensions"
    ![Finding Extensions](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zpsqxqqmjzyuiwqcmdjg.jpg)
   * In the Extensions page, search for and add "Custom Script Extension for Windows - Azure Arc."

    ![Searching for the custom extension](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g3hkzkbqhihdosi2hs0w.jpg)
   * Configure the extension to use the storage account and container containing the script.

    ![Picking the Storage Container](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dqkvfk0ov3f88w7l9j12.jpg)

    ![Picking the script](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qadyrill1eyvx9p8ppb8.jpg)

    ![Clicking "Review+Create" to create extension](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/s1fb776o93q5ln1kilf6.jpg)

8. **Verify IIS installation:**
   * Wait for the deployment to complete.
   * Open a web browser and navigate to `https://localhost`. You should see the server's name. Alternatively, check the contents of `C:\inetpub\wwwroot\iisstart.htm`.

#### Blocking the Legacy Azure Log Analytics Agent

1. **Open Command Prompt:** Launch Command Prompt on the Windows VM.

    ![Opening command prompt](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ok3mfwt19xpfj259ltn8.jpg)
2. **Check current configuration:**
   * Run `azcmagent config list` to view the current configuration.
3. **Block the agent:**
   * Execute `azcmagent config set extensions.blocklist "Microsoft.EnterpriseCloud.Monitoring/MicrosoftMonitoringAgent"` to block the agent.
4. **Verify the change:**
   * Run `azcmagent config list` again to confirm the blocklist entry.

    ![Checking the environment](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nxll8ocmoch19uyklpa9.jpg)

**Conclusion:**
Congratulations on completing this guide! You've successfully transformed your Windows Server into a managed Azure Arc-enabled machine. By integrating Azure Policy, Microsoft Defender for Cloud, Azure Monitor, and Azure Update Manager, you've established a strong foundation for security, compliance, and management.

To deepen your understanding, explore the Azure portal for detailed insights into your environment. Remember to clean up resources when finished to avoid unnecessary costs.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>azure</category>
      <category>cloud</category>
      <category>networking</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Managing Azure Arc-Enabled Windows Server Updates by Using Azure Update Manager</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Thu, 15 Aug 2024 22:15:13 +0000</pubDate>
      <link>https://forem.com/jimiog/managing-azure-arc-enabled-windows-server-updates-by-using-azure-update-manager-4bmp</link>
      <guid>https://forem.com/jimiog/managing-azure-arc-enabled-windows-server-updates-by-using-azure-update-manager-4bmp</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;In our &lt;a href="https://dev.to/jimiog/monitoring-azure-arc-enabled-windows-with-vm-insights-494g"&gt;previous guide&lt;/a&gt;, we used Insights to monitor our Azure Arc-enabled servers. Building upon that foundation, this post will delve into how to effectively manage updates for these servers using Azure Update Manager.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An Azure account with an active subscription.&lt;/li&gt;
&lt;li&gt;A Windows VM enabled with Azure Arc.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Step-by-Step Guide
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access Azure Update Manager:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Log in to your Windows server and then sign into your Azure account.&lt;/li&gt;
&lt;li&gt;Search for "Azure Update Manager" in the Azure portal and select it.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkihfmzfpg1z1tunwrsgc.jpg" alt="Locating Azure Update Manager"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Discover Your Machine:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Under the "Manage" section, choose "Machines."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flwweu5xjypy53oseqh1z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flwweu5xjypy53oseqh1z.jpg" alt="Locating Machines in Arc"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Select your Azure Arc-enabled instance from the list.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5okgkx1xjjvurquzso5x.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5okgkx1xjjvurquzso5x.jpg" alt="Locating the Arc enabled machine"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Initiate Initial Assessment:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click "Check for Updates" followed by "Trigger assess now."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn8mq8m706v57qnp6y05z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn8mq8m706v57qnp6y05z.jpg" alt="Updating the machine"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Important:&lt;/strong&gt; Do not wait for the assessment to complete. Proceed to the next step.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Periodic Assessment:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to "Update Settings."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvx5fhntjli3xzl6fj7ty.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvx5fhntjli3xzl6fj7ty.jpg" alt="Checking Update Settings"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable "Periodic assessment" and save the changes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy9qykk8rrgb2i2pyfvc7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy9qykk8rrgb2i2pyfvc7.jpg" alt="Enabling periodic updates"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Schedule Updates:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to the "Updates" page and click "Schedule Updates."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fudhjfndziygf129cu1hv.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fudhjfndziygf129cu1hv.jpg" alt="Locating Scheduled Updates"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Select your subscription, resource group, and create a configuration name.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnd11fu6ecbuk7fwxtnyd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnd11fu6ecbuk7fwxtnyd.jpg" alt="Configuring the Scheduled Updates"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Add a schedule specifying the start date, time, maintenance window, and recurrence.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl70mwi8wk0qeunn8fcun.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl70mwi8wk0qeunn8fcun.jpg" alt="Configuring recurring updates"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Review and create the update schedule.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2For8qdb3augalh1f20bhe.jpg" alt="Saving the update schedule"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Perform a One-Time Update:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Return to the "Updates" page of your Azure Arc VM and select "One-Time Update."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F172dgzx93bvxohvqte5d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F172dgzx93bvxohvqte5d.jpg" alt="COnfiguring a one time update"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check the box next to your instance and click "Next."&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1hmw5mokq9nxeciwxc50.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1hmw5mokq9nxeciwxc50.jpg" alt="Initiating an update"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;In the "Properties" tab, configure reboot options as needed (e.g., "Never Reboot").&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click "Next" and then "Install."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1vp39m5cm0y7aco8k2q5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1vp39m5cm0y7aco8k2q5.jpg" alt="Installing the update"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Key Capabilities of Azure Update Manager&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Azure Update Manager offers several features to streamline update management:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Centralized Management:&lt;/strong&gt; Manage updates for multiple Azure Arc-enabled servers from a single console.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scheduled Updates:&lt;/strong&gt; Automate update deployment during off-peak hours or maintenance windows.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Assessment and Compliance:&lt;/strong&gt; Evaluate update status and compliance with organizational policies.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
By following these steps, you've successfully configured Azure Update Manager to manage updates for your Azure Arc-enabled Windows servers. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps:&lt;/strong&gt;&lt;br&gt;
In the &lt;a href="https://dev.to/jimiog/configuring-azure-arc-enabled-windows-servers-with-azure-vm-extensions-him"&gt;next post&lt;/a&gt;, we'll explore configuring Azure Arc-enabled Windows servers using Azure VM Extensions.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>cloud</category>
      <category>monitoring</category>
    </item>
    <item>
      <title>Monitoring Azure Arc-Enabled Windows with VM Insights</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Thu, 15 Aug 2024 22:14:20 +0000</pubDate>
      <link>https://forem.com/jimiog/monitoring-azure-arc-enabled-windows-with-vm-insights-494g</link>
      <guid>https://forem.com/jimiog/monitoring-azure-arc-enabled-windows-with-vm-insights-494g</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;Building on our &lt;a href="https://dev.to/jimiog/enhancing-your-azure-arc-enabled-server-security-with-microsoft-defender-for-cloud-3g83"&gt;previous guide&lt;/a&gt; on securing your cloud environment with Microsoft Defender for Cloud, we'll now focus on enhancing visibility into your Azure Arc-enabled Windows servers using Azure Monitor.&lt;/p&gt;

&lt;p&gt;In this post, we'll set up VM Insights to collect and analyze performance data for your servers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An Azure account with an active subscription.&lt;/li&gt;
&lt;li&gt;A Windows VM enabled with Azure Arc.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Creating a Log Analytics Workspace
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Navigate to the Azure portal and search for "Log Analytics Workspaces."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkfe7om34u6qox4ykon6f.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkfe7om34u6qox4ykon6f.jpg" alt="Locating Log Analytics Workspaces"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;+ Create&lt;/strong&gt; to create a new workspace.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fczvpywb3xzzw623tyldc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fczvpywb3xzzw623tyldc.jpg" alt="Creating Workspace"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide a name, select your subscription and resource group, and then click &lt;strong&gt;Review + Create&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9oybey1l91fazr3405kh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9oybey1l91fazr3405kh.jpg" alt="Configuring Workspaces"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Enabling VM Insights
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Search for "Azure Arc" in the Azure portal and navigate to &lt;strong&gt;Machines&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Few2jmfmulg6ebp6u4oxa.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Few2jmfmulg6ebp6u4oxa.jpg" alt="Locating Arc Machine"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select your target Windows server and go to the &lt;strong&gt;Monitoring&lt;/strong&gt; section and click &lt;strong&gt;Insights&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F84vazyg67c9m8353658h.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F84vazyg67c9m8353658h.jpg" alt="Locating Machine Insight"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click on &lt;strong&gt;Enable&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz2369ovfehsm8t5vhr94.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz2369ovfehsm8t5vhr94.jpg" alt="Enabling the Machine insight"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Choose your subscription and click &lt;strong&gt;Create new&lt;/strong&gt; for the data collection rule.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2qe0pivud1nq0kx9a0b4.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2qe0pivud1nq0kx9a0b4.jpg" alt="Creating a Data Collection Rule"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Give the data collection rule a name, enable process and dependencies mapping, select your Log Analytics workspace, and click &lt;strong&gt;Create&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5c5arf0jkz04h0ok5llw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5c5arf0jkz04h0ok5llw.jpg" alt="Configuring the Data Collection Rule"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Exploring Performance Data
&lt;/h4&gt;

&lt;p&gt;While data collection takes a few minutes, you can navigate to the &lt;strong&gt;Arc Lab Insights&lt;/strong&gt; page for your machine and select the &lt;strong&gt;Performance&lt;/strong&gt; tab.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp5xvdc3esvk33c2ivqoi.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp5xvdc3esvk33c2ivqoi.jpg" alt="Locating the Performance tab"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This page provides server properties and summarizes event types and their counts.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhl0esyldfwxo8nyg9rpt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhl0esyldfwxo8nyg9rpt.jpg" alt="Machine Insights"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
Congratulations! You've successfully set up monitoring for your Azure Arc-enabled Windows server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps:&lt;/strong&gt;&lt;br&gt;
In the &lt;a href="https://dev.to/jimiog/managing-azure-arc-enabled-windows-server-updates-by-using-azure-update-manager-4bmp"&gt;next guide&lt;/a&gt;, we'll explore how to manage updates for your Azure Arc-enabled Windows servers using Azure Update Manager.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>cloud</category>
      <category>monitoring</category>
    </item>
    <item>
      <title>Enhancing Your Azure Arc Enabled Server Security with Microsoft Defender for Cloud</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Thu, 15 Aug 2024 22:13:19 +0000</pubDate>
      <link>https://forem.com/jimiog/enhancing-your-azure-arc-enabled-server-security-with-microsoft-defender-for-cloud-3g83</link>
      <guid>https://forem.com/jimiog/enhancing-your-azure-arc-enabled-server-security-with-microsoft-defender-for-cloud-3g83</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;Now that your Arc Enabled Windows server has the &lt;a href="https://dev.to/jimiog/managing-azure-arc-windows-servers-with-azure-policy-5ajn"&gt;Azure Monitoring Agent&lt;/a&gt; installed, let's bolster its security with Microsoft Defender for Cloud. This powerful tool provides comprehensive protection against various threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An Azure account with an active subscription.&lt;/li&gt;
&lt;li&gt;A Windows VM enabled with Azure Arc. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Enabling Microsoft Defender for Cloud&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access Your Azure Portal:&lt;/strong&gt; Log in to your Windows VM and then your Azure account. Search for and select "Microsoft Defender for Cloud."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjmpofh0wo6lixfofis8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjmpofh0wo6lixfofis8.jpg" alt="Locating Microsoft Defender for Cloud"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Get Started:&lt;/strong&gt; Navigate to the "General" section and click "Getting started."&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upgrade Your Subscription:&lt;/strong&gt; Locate your subscription, check the box beside it, and select "upgrade." Ignore any prompts to install agents.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhvfagkaujp33ge5dc1pb.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhvfagkaujp33ge5dc1pb.jpg" alt="Enabling Microsoft Defender for Cloud"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Environment Settings:&lt;/strong&gt; Go to "Management" on the left-hand side and click "Environment settings."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yx41w5hyw6ve2lmat85.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0yx41w5hyw6ve2lmat85.jpg" alt="Configuring Envrionment Settings"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Select Your Environment:&lt;/strong&gt; Choose the entry you're using for these guides that contains your Arc VM.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffg0jot9p23364ztjgum7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffg0jot9p23364ztjgum7.jpg" alt="Locating your Subscriptioin to defend"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Review and Enable Plans:&lt;/strong&gt; Explore the available plans and enable the desired ones. Save your selections.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flhmld1n3h3xiq31x7nib.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flhmld1n3h3xiq31x7nib.jpg" alt="Enabling Cloud defender plans"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Exploring Microsoft Defender for Cloud Capabilities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To understand how Microsoft Defender for Cloud protects your Arc Enabled Windows server:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access Inventory:&lt;/strong&gt; Return to the "General" section in Microsoft Defender for Cloud and click "Inventory."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkahy5qm9q27otj53b85n.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkahy5qm9q27otj53b85n.jpg" alt="Locating Inventory"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Find Your Arc Instance:&lt;/strong&gt; Locate and select your Azure Arc instance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxxo6c85qzs22lgwfa5wm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxxo6c85qzs22lgwfa5wm.jpg" alt="Finding the Arc instance"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Review Recommendations:&lt;/strong&gt; Click on a recommendation to view details.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2w019facojaaw0ig2q6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2w019facojaaw0ig2q6.jpg" alt="Reviewing a recommendation"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Implement Fixes:&lt;/strong&gt; Follow the instructions under "Remediate" or use the "Fix" option if available.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjxk1qdsdyms5tgvnx5ri.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjxk1qdsdyms5tgvnx5ri.jpg" alt="Implementing a recommended fix"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
Congratulations! You've successfully enabled Microsoft Defender for Cloud to safeguard your cloud environment. By proactively addressing recommendations, you're strengthening your server's security posture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps:&lt;/strong&gt;&lt;br&gt;
In the &lt;a href="https://dev.to/jimiog/monitoring-azure-arc-enabled-windows-with-vm-insights-494g"&gt;next post&lt;/a&gt;, we'll delve into monitoring your Azure Arc-enabled Windows servers using Azure Monitor.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>cloud</category>
      <category>security</category>
    </item>
    <item>
      <title>Managing Azure Arc Windows Servers with Azure Policy</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Thu, 15 Aug 2024 22:12:10 +0000</pubDate>
      <link>https://forem.com/jimiog/managing-azure-arc-windows-servers-with-azure-policy-5ajn</link>
      <guid>https://forem.com/jimiog/managing-azure-arc-windows-servers-with-azure-policy-5ajn</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;In our &lt;a href="https://dev.to/jimiog/unleash-the-power-of-hybrid-cloud-with-azure-arc-3kc3"&gt;previous guide&lt;/a&gt;, we explored how to connect your on-premises Windows servers to the Azure cloud using Azure Arc. This integration opens up a world of Azure services and capabilities for your hybrid environment.&lt;/p&gt;

&lt;p&gt;This guide will focus on leveraging Azure Policy to manage compliance and configuration for your Azure Arc-enabled Windows servers. We'll demonstrate this by automatically installing the Azure Monitor Agent.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prerequisites:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An Azure account with an active subscription.&lt;/li&gt;
&lt;li&gt;A Windows VM enabled with Azure Arc.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Step-by-Step Guide
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log in to Azure and your Windows VM.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create an Azure Policy:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to Azure Policy in the Azure portal.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fadeubt74gybtjw3fwes5.jpg" alt="Finding Azure Policy"&gt;
&lt;/li&gt;
&lt;li&gt;Under &lt;strong&gt;Authoring&lt;/strong&gt;, select &lt;strong&gt;Definitions&lt;/strong&gt;.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5mk3tgsnmsshlvqrr31c.jpg" alt="Finding Policy Definitions"&gt;
&lt;/li&gt;
&lt;li&gt;Search for "Configure Windows Arc-Enabled machines" and select "Configure Arc-enabled machines to run Azure Monitor Agent".
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fin9al9i7q2j2s0jje4ff.jpg" alt="Searching for arc-enabled service"&gt;
&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Assign policy&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select your subscription and resource group as the scope.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe4giyma9t43dhmhiqlqi.jpg" alt="Defining policy scope"&gt;
&lt;/li&gt;
&lt;li&gt;Navigate to the &lt;strong&gt;Remediation&lt;/strong&gt; tab and enable "Create a remediation task".&lt;/li&gt;
&lt;li&gt;Review and create the policy assignment.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fif4d638kghasjo6i3wn5.jpg" alt="Creating the Policy"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Monitor Policy Compliance and Remediation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go back to &lt;strong&gt;Policy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Definitions&lt;/strong&gt; and click &lt;strong&gt;Compliance&lt;/strong&gt;.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnl6ajdxabc4x7mfxbfv7.jpg" alt="Finding Compliance"&gt;
&lt;/li&gt;
&lt;li&gt;Locate the policy and verify its non-compliant status.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frxqexi8si2tdhbtq4wrf.jpg" alt="Non compliant policy"&gt;
&lt;/li&gt;
&lt;li&gt;The remediation task is automatically running. You can verify this in &lt;strong&gt;Policy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Remediation&lt;/strong&gt; &amp;gt; &lt;strong&gt;Remediation tasks&lt;/strong&gt;.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8c6q8gov6dymcxx7w38e.jpg" alt="Confirming remediation task"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Verify Azure Monitor Agent Installation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to &lt;strong&gt;Azure Arc&lt;/strong&gt; &amp;gt; &lt;strong&gt;Machines&lt;/strong&gt;.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlu96rt7tw0mx2bff4k9.jpg" alt="Navigating to Arc Machines"&gt;
&lt;/li&gt;
&lt;li&gt;Select your instance and go to &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Extensions&lt;/strong&gt;.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3b3zj2m2ira8fsw84p9t.jpg" alt="Checking the Arc machine extension"&gt;
&lt;/li&gt;
&lt;li&gt;Verify that the &lt;strong&gt;AzureMonitorWindowsAgent&lt;/strong&gt; extension is installed.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyvggbm6o06xwbevqljtj.jpg" alt="Verifying the extension is downloaded"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
Congratulations! You've successfully used Azure Policy to ensure your Azure Arc-enabled Windows VM has the Azure Monitor Agent installed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps:&lt;/strong&gt;&lt;br&gt;
In the &lt;a href="https://dev.to/jimiog/enhancing-your-azure-arc-enabled-server-security-with-microsoft-defender-for-cloud-3g83"&gt;next guide&lt;/a&gt;, we'll delve deeper into enhancing the security of your Azure Arc-enabled Windows servers using Microsoft Defender for Cloud.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>cloud</category>
      <category>networking</category>
    </item>
    <item>
      <title>Unleash the Power of Hybrid Cloud with Azure Arc</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Thu, 15 Aug 2024 22:11:37 +0000</pubDate>
      <link>https://forem.com/jimiog/unleash-the-power-of-hybrid-cloud-with-azure-arc-3kc3</link>
      <guid>https://forem.com/jimiog/unleash-the-power-of-hybrid-cloud-with-azure-arc-3kc3</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Ready to unlock the full potential of your on-premises environment?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This guide will walk you through the process of seamlessly integrating your Windows server into the Azure ecosystem using Azure Arc. By extending Azure management and services to your on-premises infrastructure, you can gain the benefits of a unified management plane and hybrid cloud capabilities without the limitations of cloud-native environments.&lt;/p&gt;

&lt;p&gt;While Azure VMs typically come pre-installed with the Azure Arc agent, this tutorial focuses on an AWS Windows VM to avoid the complexities of agent removal and reinstallation.&lt;/p&gt;

&lt;p&gt;We'll cover the following steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Creating a Windows VM on AWS&lt;/li&gt;
&lt;li&gt;Installing the Azure Arc agent on the Windows server&lt;/li&gt;
&lt;li&gt;Managing your Azure Arc-enabled server within the Azure portal&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let's begin!&lt;/p&gt;

&lt;h3&gt;
  
  
  Pre-requisites
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An active Azure subscription&lt;/li&gt;
&lt;li&gt;An active AWS account&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; If you already possess a pre-configured Windows VM, you can skip to Part 2: Installing Azure Arc on a Windows VM.&lt;/p&gt;

&lt;h3&gt;
  
  
  Part 1: Creating a Windows VM on AWS
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Log in to your AWS account and navigate to the VPC service:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In the search bar, type "VPC" and select it.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzv61zsyblnijvgx4hu6q.jpg" alt="Finding VPC" width="800" height="800"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create a VPC:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click on "Create VPC."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmg0heptk2q718dbh6p9g.jpg" alt="Clicking on Create VPC" width="800" height="741"&gt;
&lt;/li&gt;
&lt;li&gt;Select "VPC and more" and choose a descriptive name for your VPC.&lt;/li&gt;
&lt;li&gt;Since we'll be connecting to the VM remotely, ensure you have at least one Availability Zone selected.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx15xmhtay1yuah4bsy5d.jpg" alt="Configuring the VPC part 1" width="800" height="743"&gt;
&lt;/li&gt;
&lt;li&gt;Leave the number of private subnets at 0 for this basic setup.&lt;/li&gt;
&lt;li&gt;For simplicity, set NAT gateways and VPC endpoints to "None" for now.&lt;/li&gt;
&lt;li&gt;Click "Create VPC" to complete the process.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyxsqil12o2idjfgfzh13.jpg" alt="Configuring VPC part 2" width="800" height="741"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Launch an EC2 Instance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to the EC2 service by searching for it in the search bar.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftfauvn16lbs5e4935lc6.jpg" alt="Seaching for EC2" width="800" height="800"&gt;
&lt;/li&gt;
&lt;li&gt;Click on "Launch Instance."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmbroo8tk3qldrwcvkdmm.jpg" alt="Creating an EC2 Instance" width="800" height="741"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Instance Details:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Provide a recognizable name for your EC2 instance.&lt;/li&gt;
&lt;li&gt;Select a Windows Server Application Image that suits your needs.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiuk7dvc1kqba90bm9q4o.jpg" alt="Configuring EC2 part 1" width="800" height="741"&gt;
&lt;/li&gt;
&lt;li&gt;Choose an appropriate instance type, keeping in mind higher tiers incur higher charges.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create a Key Pair:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click on "Create new key pair" and generate a Key Pair.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmasbjd2620f218pxhww.jpg" alt="Configuring EC2 instance part 2" width="800" height="742"&gt;
&lt;/li&gt;
&lt;li&gt;Give your Key Pair a descriptive name and download it securely. Store it somewhere you can easily access it later.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcm0w6wce2i3a5mxc9vaa.jpg" alt="Configuring EC2 instance part 3" width="800" height="743"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configure Network Settings:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Leave "Create Security Group" selected.&lt;/li&gt;
&lt;li&gt;For demonstration purposes, we will allow RDP traffic from "Anywhere" temporarily. You can restrict this later to specific IP addresses for increased security.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsgov1eprh8g2yuv1fb36.jpg" alt="Configuring EC2 instance part 4" width="800" height="742"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Launch the Instance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Review all configurations and click "Launch Instances" to begin the creation process.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Connect to the Windows VM:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Once launched, locate the EC2 instance you created and check the "Launch" state.&lt;/li&gt;
&lt;li&gt;Click on "Connect" to initiate the remote desktop connection.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fppq14ujekymzjq14975k.jpg" alt="EC2 Instance Instantiated" width="800" height="744"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Establish Remote Desktop Connection:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Choose the RDP client you prefer.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdwkisbbc3mhkt6biq8dz.jpg" alt="Choosing RDP client" width="800" height="741"&gt;
&lt;/li&gt;
&lt;li&gt;Click "Get Password" and select the option to "Upload private key file." Locate the downloaded Key Pair file and click "Decrypt Password."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdsieyu658parfo3v3kde.jpg" alt="Locating the Private Key" width="800" height="740"&gt;
&lt;/li&gt;
&lt;li&gt;Copy the decrypted password and download the provided remote desktop file.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7y1kblm2x6k6bl8e3ojv.jpg" alt="Downloading the RDP file" width="800" height="741"&gt;
&lt;/li&gt;
&lt;li&gt;Open the downloaded RDP file and paste the copied password when prompted. Connect to the VM.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F270or5orbvvvjy2bem2b.jpg" alt="Logging into the VM" width="456" height="388"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Part 2: Installing Azure Arc on a Windows VM
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Allow the VM to boot up and connect to Microsoft Edge.&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Sign in to Azure Portal:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open Microsoft Edge and navigate to portal.azure.com.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4292rwxjhz98bhk5i7pp.jpg" alt="Locating Microsoft Edge" width="800" height="450"&gt;
&lt;/li&gt;
&lt;li&gt;Log in to your Azure account.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fss9n5nhqbqppd9qpm88i.jpg" alt="Logging into Azure" width="800" height="620"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Install Azure Arc Agent:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Search for "Azure Arc" in the search bar and select it.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpwyspqcpk9h8zhygo9g8.jpg" alt="Locating Azure Arc" width="800" height="805"&gt;
&lt;/li&gt;
&lt;li&gt;Locate the "Manage resources across environments" section and click on "Add resources"
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fztotsyzvuaexzo41koxi.jpg" alt="Finding the add resources section" width="800" height="771"&gt;
&lt;/li&gt;
&lt;li&gt;Navigate to the "Machines" category and click "Add/Create" followed by "Add a Machine."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmtasxzhoos5k1j7qd6fe.jpg" alt="Adding a machine" width="800" height="772"&gt;
&lt;/li&gt;
&lt;li&gt;In the "Add a Single Server" section, click "Generate Script."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F39zdshyl8x3vj3iij95q.jpg" alt="Configuring a script for the Arc machine" width="800" height="770"&gt;
&lt;/li&gt;
&lt;li&gt;Choose a suitable region for your environment.&lt;/li&gt;
&lt;li&gt;Under "Resource Group," click "Create New" and give your resource group a descriptive name. Leave other settings as default and click "Download and Run Script."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F604ml9txf0jojbdxo320.jpg" alt="Configuring the script" width="800" height="768"&gt;
&lt;/li&gt;
&lt;li&gt;Save the downloaded script (usually in your Downloads folder).
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnjpring32eukl5aac6hx.jpg" alt="Downloading the script" width="800" height="769"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Run the Onboarding Script:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open the Start Menu and search for "PowerShell." Right-click on PowerShell and select "Run as administrator."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4vem80hk5ngqgeus64ji.jpg" alt="Finding Powershell" width="800" height="900"&gt;
&lt;/li&gt;
&lt;li&gt;Use the following commands to navigate to your Downloads folder and run the script:
&lt;/li&gt;
&lt;/ul&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;cd&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;downloads&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="n"&gt;/OnboardingScript.ps1&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;


&lt;ul&gt;
&lt;li&gt;Confirm any security warnings by typing "Y" and letting the script run.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz447fennqioal34647w3.jpg" alt="Loading the OnboardingScript" width="800" height="418"&gt;
&lt;/li&gt;
&lt;li&gt;Choose your Azure account and allow the script to complete the installation.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwji7gw15a2b8begrojc0.jpg" alt="Signing into the Azure account" width="720" height="680"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Verify Azure Arc Connection:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go back to the Azure portal and search for "Azure Arc."&lt;/li&gt;
&lt;li&gt;Under "Azure Arc resources" on the left side, click on "Machines."
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzimzikm6bv098dqjpys5.jpg" alt="Locating Arc Machines" width="800" height="772"&gt;
&lt;/li&gt;
&lt;li&gt;You should now see your Windows VM listed. This confirms successful connection to your Azure environment.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyog4voub2fxatau70l90.jpg" alt="Confirming the Machine is an Arc machine" width="800" height="772"&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
Congratulations, you have now installed an Azure Arc agent onto your Windows server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Steps:&lt;/strong&gt;&lt;br&gt;
The &lt;a href="https://dev.to/jimiog/managing-azure-arc-windows-servers-with-azure-policy-5ajn"&gt;next guide&lt;/a&gt; will explore managing Azure Arc-enabled Windows servers using Azure Policy for centralized configuration and control.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>azure</category>
      <category>cloud</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Sat, 03 Aug 2024 19:14:11 +0000</pubDate>
      <link>https://forem.com/jimiog/simulating-a-privelege-escalation-attack-to-test-your-sentinel-and-defender-setup-final-4n0b</link>
      <guid>https://forem.com/jimiog/simulating-a-privelege-escalation-attack-to-test-your-sentinel-and-defender-setup-final-4n0b</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;This is the final post in our &lt;a href="https://dev.to/jimiog/configuring-data-collection-and-analytics-in-microsoft-sentinel-part-3-l5f"&gt;series&lt;/a&gt; on setting up Sentinel and Defender for threat detection. In previous posts, we established a sentinel and defender, populated it with units, connected it to a VM, and created an analytic rule to notify a user when an incident occurs. Now, let's test the entire system by simulating a privilege escalation attack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Understanding the Attack:&lt;/strong&gt;&lt;br&gt;
A privilege escalation attack aims to grant unauthorized users higher-level privileges. In this simulation, we'll create a new user account and then elevate it to the administrators group.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Locate the Target VM:&lt;/strong&gt; Access the Windows VM you created in a previous step.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx1v14i1dy2ce2mc6g5u9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx1v14i1dy2ce2mc6g5u9.jpg" alt="Locating the VM and run command" width="800" height="767"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Execute PowerShell Script:&lt;/strong&gt; Navigate to the "Operations" section and select "Run PowerShell Script."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fas67g0dg75nh2x4ufv5u.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fas67g0dg75nh2x4ufv5u.jpg" alt="Running a command script" width="800" height="765"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Create a New User:&lt;/strong&gt; Paste the following command into the PowerShell script, replacing "labusername" and "LabPassword1!" with your desired credentials:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="w"&gt;   &lt;/span&gt;&lt;span class="n"&gt;net&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;user&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;labusername&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;/add&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="n"&gt;net&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;user&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;labusername&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;LabPassword1&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="n"&gt;net&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;localgroup&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;administrators&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;labusername&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;/add&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command creates a new user, sets a password, and adds the user to the administrators group.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Verify Attack Success:&lt;/strong&gt; You should see three successful messages confirming the creation of the user, setting the password, and adding the user to the administrators group.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Monitor for Incident:&lt;/strong&gt; Return to Microsoft Sentinel and navigate to the "Threat Management" section, then select "Incidents."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4852bkoxr2tw2w8fxpqy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4852bkoxr2tw2w8fxpqy.jpg" alt="Locating the Incidents in Sentinel" width="800" height="766"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Identify the Incident:&lt;/strong&gt; Look for an incident matching the name you configured in your analytic rule.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fztfhxf1clfvwhinj618i.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fztfhxf1clfvwhinj618i.jpg" alt="Finding the event" width="800" height="767"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Review Incident Details:&lt;/strong&gt; Select the incident and click "View full details" to examine the incident information. Verify that the owner assigned to the incident is the user specified in your automation rule.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdkowphkcjh3rn9f8oexx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdkowphkcjh3rn9f8oexx.jpg" alt="Looking at the event details" width="800" height="767"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;By following these steps and carefully analyzing the results, you can validate the effectiveness of your Sentinel and Defender setup in detecting and responding to potential threats.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>cloud</category>
      <category>security</category>
    </item>
    <item>
      <title>Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)</title>
      <dc:creator>Jimi</dc:creator>
      <pubDate>Sat, 03 Aug 2024 19:13:31 +0000</pubDate>
      <link>https://forem.com/jimiog/configuring-data-collection-and-analytics-in-microsoft-sentinel-part-3-l5f</link>
      <guid>https://forem.com/jimiog/configuring-data-collection-and-analytics-in-microsoft-sentinel-part-3-l5f</guid>
      <description>&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;Building on our previous &lt;a href="https://dev.to/jimiog/enhancing-your-microsoft-sentinel-environment-with-content-hub-solution-part-2-13k1"&gt;posts&lt;/a&gt;, we'll now delve into configuring data collection rules and setting up basic analytics in Microsoft Sentinel. Before we begin, create a Windows VM in the same Resource Group as the workbook.&lt;/p&gt;

&lt;h3&gt;
  
  
  Configuring Data Collection Rules
&lt;/h3&gt;

&lt;p&gt;To effectively leverage Microsoft Sentinel, we need to ensure that relevant data is being collected. Let's configure a data collection rule for Windows Security Events:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Navigate to the Configuration section&lt;/strong&gt; in Microsoft Sentinel and select &lt;strong&gt;Data Connectors&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6p2pl9hhlg58gwfjgqm2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6p2pl9hhlg58gwfjgqm2.jpg" alt="Locating Data connectors" width="800" height="765"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Search for and select &lt;strong&gt;Windows Security Events via AMA&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Open connector page&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7p8kmsdv5sh16bu936ld.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7p8kmsdv5sh16bu936ld.jpg" alt="Opening the connector page for Windows Security Events" width="800" height="765"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Configuration&lt;/strong&gt; section, click &lt;strong&gt;+Create data collection rule&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnvmufczrjk14f1isdena.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnvmufczrjk14f1isdena.jpg" alt="Creating a data collection rule" width="800" height="765"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide a name for the Data Collector, select your subscription, and choose the resource group.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2unuptzy7yrumquwati1.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2unuptzy7yrumquwati1.jpg" alt="Creating the Data Collection Rule" width="800" height="768"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Expand the subscription tab, locate the Windows virtual machine you created, and select it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flzzn9u81jqagajh9cj89.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flzzn9u81jqagajh9cj89.jpg" alt="Locating the Windows VM" width="800" height="766"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Collect&lt;/strong&gt; section, leave &lt;strong&gt;All Security Events&lt;/strong&gt; selected.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flvip44zazeeg47edsz8y.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flvip44zazeeg47edsz8y.jpg" alt="Choosing events to stream" width="800" height="801"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Click &lt;strong&gt;Review+Create&lt;/strong&gt; and then &lt;strong&gt;Create&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Creating a Near Real-Time (NRT) Query Detector
&lt;/h3&gt;

&lt;p&gt;To promptly identify potential threats, we'll set up a basic NRT query detector:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In Microsoft Sentinel, navigate to the &lt;strong&gt;Configuration&lt;/strong&gt; section and select &lt;strong&gt;Analytics&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4jxmdahquva9u2y3uph8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4jxmdahquva9u2y3uph8.jpg" alt="Locating Analytics" width="800" height="767"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;+Create&lt;/strong&gt; and choose &lt;strong&gt;NRT query rule&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzhucokahdg1j052f98ys.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzhucokahdg1j052f98ys.jpg" alt="Creating a NRT query rule" width="800" height="766"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide a name for the query and select &lt;strong&gt;Privilege Escalation&lt;/strong&gt; from the MITRE ATT&amp;amp;CK framework.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmfr55onti7edlldcit65.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmfr55onti7edlldcit65.jpg" alt="Configuring Analytics Rule" width="800" height="767"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Rule Query&lt;/strong&gt; section, input the following logic:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SecurityEvent
| where EventID == 4732
| where TargetAccount == "Builtin\\Administrators"
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqnlcncerfox9x0fkrdh8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqnlcncerfox9x0fkrdh8.jpg" alt="Configuring the Rule query" width="800" height="766"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configure the query scheduling and other parameters as needed.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Click &lt;strong&gt;Review+Create&lt;/strong&gt; and then &lt;strong&gt;Create&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Configuring Automation
&lt;/h3&gt;

&lt;p&gt;To streamline incident response, we'll create a basic automation rule:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Return to the &lt;strong&gt;Configuration&lt;/strong&gt; section in Microsoft Sentinel and select &lt;strong&gt;Automation&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0s49hzkpbw7b7yenlnky.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0s49hzkpbw7b7yenlnky.jpg" alt="Locating Automation again" width="800" height="765"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;+Create&lt;/strong&gt; and choose &lt;strong&gt;automation rule&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzvehe298c4evbgm285ta.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzvehe298c4evbgm285ta.jpg" alt="Creating an Automation rule" width="800" height="768"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Provide a name for the automation rule and assign an owner.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Configure the automation logic and conditions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frtw2pijiulpxznxti7ra.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frtw2pijiulpxznxti7ra.jpg" alt="Assigning the rule to an owner" width="800" height="768"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;By following these steps you've set up Windows Security Event data collection, created near real-time query detectors, and configured basic automation rules in Microsoft Sentinel. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In the &lt;a href="https://dev.to/jimiog/simulating-a-privelege-escalation-attack-to-test-your-sentinel-and-defender-setup-final-4n0b"&gt;next post&lt;/a&gt;, we'll simulate an attack to validate the analytic and automation rules.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>security</category>
      <category>cloud</category>
    </item>
  </channel>
</rss>
