cloudcoffee.ch

Freshly brewed with Microsoft Azure and Microsoft 365

Protect Azure resources from accidental deletion with Azure Resource Locks

Azure Resource Locks can be used to easily and effectively protect Azure subscriptions, resource groups or individual resources from accidental deletion. The lock overrides any user permissions.

This guide shows how to enable Azure Resource Locks and which properties can be configured.

Deploying Azure Naming Tool on a docker container

The Azure Naming Tool is a free tool for docker container that always generates the correct name for an Azure resource based on best practices.

Microsoft has provided guidance on the various phases in the cloud adoption strategy in the Cloud Adoption Framework. These guides also include best practices for naming Azure resources. Naming is extremely important, but it is also very extensive. As a result, many ambiguities or errors can arise when naming resources.

This guide describes the installation and configuration of Azure Naming Tool step-by-step on a Docker container.

Azure AD B2B Direct Connect for shared channels in Microsoft Teams

Microsoft offers with Azure AD B2B Direct Connect for shared channels in Microsoft Teams a feature that simplifies management for collaboration with external partners in teams.

Until the release of Azure AD B2B Direct Connect, an external partner was invited to the tenant as a guest and authorized in Microsoft Teams (Azure AD B2B Collaboration). The external partner then received an email with instructions for further steps.

When looking in to the own Azure Active Directory everyone notes: each external user gets a guest account in our own Azure Active Directory. Whether the guest account is still in use or not, it will always remain in Azure Active Directory until it is manually deleted.

cmd.ms Microsoft Cloud command line for the browser

Finding the right blade in the Microsoft portal can be time-consuming and complicated. With cmd.ms exists a Microsoft Cloud command line for the browser. This can be used to access specific portals and blades such as conditional access, MFA (multi-factor authentication), quarantine emails and many more directly from the browser address bar.

Page 1 of 7

Powered by WordPress & Theme by Anders Norén