cloudcoffee.ch

Freshly brewed with Microsoft Azure and Microsoft 365

Secure Emergency Access: Create and Manage Microsoft Entra Emergency Accounts with YubiKey (FIDO2)

A Microsoft Entra emergency access account, also known as a “Break Glass Account”, is a special account set up for accessing Azure resources in emergency situations. This account typically has higher permissions and is only used when conventional access routes are not available. This could be, for example, a service outage, so that no multi-factor authentication can be performed via a mobile phone. The use of emergency accounts is strictly controlled, monitored, and restricted.

Microsoft Entra Private Access: secure access to internal resources and cloud services without VPN

Microsoft Entra Private Access gives users secure access to the internal network and cloud-based services from anywhere in the world. Setting up and maintaining (complex) VPN connections is now a thing of the past. Microsoft Entra Private Access is part of Microsoft Global Secure Access, which includes a range of identity and network access security products. The service is based on the SASE framework (Secure Access Service Edge), which combines WAN functions and zero-trust network access (ZTNA) in a cloud-based platform.

The Guardian of Azure Services: Azure Service Health

An essential aspect of using cloud services is ensuring availability and performance. Outages or performance problems have a significant impact on today’s business processes and lost revenue, image damage and angry customers.

Azure Service Health is a free service from Microsoft Azure. The service provides real-time information in a dashboard about the status and performance of Azure services. The service continuously monitors resources and proactively informs about service problems.

SMB over QUIC and Azure Server: empowering secure and lightning fast file sharing

SMB over QUIC is a network protocol used by Windows. It allows secure, shared use of resources such as files on the network. To use SMB (Server Message Block) without QUIC, TCP port 445 is required. Some Internet providers block TCP port 445 for security reasons. Therefore, it is not possible to connect to a file share on Azure by SMB successfully.

To bypass the blocking of TCP port 445, there are several options to choose from, including the following:

  • VPN (Virtual Private Network), e.g. AlwaysOnVPN
  • Third party software, e.g. MyWorkDrive
  • SMB over QUIC (Quick UDP Internet Connection)

Create proximity placement groups in Azure

Low network latency between virtual machines generally contributes to optimized performance. The proximity placement group feature in Azure ensures that virtual machines within the same proximity placement group are physically located in the same datacenter.

Proximity placement groups in Azure are particularly suitable for services and workloads (ERP, databases, real time services) with low latency requirements.

Page 2 of 10

Powered by WordPress & Theme by Anders Norén