Freshly brewed with Microsoft Azure and Microsoft 365

Tag: Tutorials Page 2 of 6

Looking for tutorials for Microsoft Azure and Microsoft 365? You can find all our tutorials in this archive.

Seamless Upgrade of Windows Server on Azure: Best Practices and Step-by-Step Guide

Microsoft Azure supports in-place upgrade to Windows Server 2019 and Windows Server 2022. All data, server roles and settings are taken over in the process. For a successful in-place upgrade there are a few requirements.

This guide shows how to successfully perform a direct upgrade to a newer Windows Server version.

Create an Azure snapshot of a virtual hard disk

An Azure Snapshot is an exact image of a disk at a specific point in time. This is a quicker way to back up the state of a hard disk than with an Azure backup.

Azure snapshots are best suited when, for example, operating system or software updates are to be tested. Additional virtual machines can be cloned from an Azure snapshot for this purpose. An existing virtual machine can also be restored to the original state of the snapshot if required.

This guide describes how to create an Azure snapshot, how to download a snapshot in VHD format, and how to clone a virtual machine from an Azure snapshot.

Setting up SPF, DKIM and DMARC in Exchange Online

SPF (Sender Policy Framework), DKIM (Domain Keys Identified Mail) and DMARC (Domain based Message Authentication, Reporting and Conformance) are used to check email messages. In combination, the three procedures achieve a high level of security with regard to the authenticity of the sender and content of an email.

This guide sets up SPF, DKIM and DMARC for Exchange Online.

Deploying Azure Naming Tool on a docker container

The Azure Naming Tool is a free tool for docker container that always generates the correct name for an Azure resource based on best practices.

Microsoft has provided guidance on the various phases in the cloud adoption strategy in the Cloud Adoption Framework. These guides also include best practices for naming Azure resources. Naming is extremely important, but it is also very extensive. As a result, many ambiguities or errors can arise when naming resources.

This guide describes the installation and configuration of Azure Naming Tool step-by-step on a Docker container.

Exchange Online: Mail encryption with Information Rights Management (IRM)

Confidential information such as contracts, financial reports, employee or customer data is often exchanged via email. These emails are mostly not encrypted. With Information Rights Management (IRM), encrypted emails can be sent and received between people inside and outside your organization. Sent emails and their replies are encrypted automatically with transport rules or manually from Exchange Online email client (Outlook and Outlook.com).

Information Rights Management (IRM) ensures that only intended recipients can open and read the message. It is also possible to prevent emails from being forwarded, printed or parts of them copied. Message encryption works with Outlook, Outlook.com, Gmail and many other popular email services.

Page 2 of 6

Powered by WordPress & Theme by Anders Norén