Tutorials
Looking for tutorials for Microsoft Azure and Microsoft 365? You can find all our tutorials in this archive.
Create an Azure snapshot of a virtual hard disk
An Azure Snapshot is an exact image of a disk at a specific point in time. This is a quicker way to back up the state of a hard disk than with an Azure backup. Azure snapshots are best suited when, for example, operating system or software updates are to be tested. Additional virtual machines can be cloned from an Azure snapshot for this purpose. An existing virtual machine can also be restored to the original state of the snapshot if required. This guide describes how to create an Azure snapshot, how to download a snapshot in VHD format, and how to clone a virtual machine from an Azure snapshot.
Setting up SPF, DKIM and DMARC in Exchange Online
SPF (Sender Policy Framework), DKIM (Domain Keys Identified Mail) and DMARC (Domain based Message Authentication, Reporting and Conformance) are used to check email messages. In combination, the three procedures achieve a high level of security with regard to the authenticity of the sender and content of an email. This guide sets up SPF, DKIM and DMARC for Exchange Online.
Deploying Azure Naming Tool on a docker container
The Azure Naming Tool is a free tool for docker container that always generates the correct name for an Azure resource based on best practices. Microsoft has provided guidance on the various phases in the cloud adoption strategy in the Cloud Adoption Framework. These guides also include best practices for naming Azure resources. Naming is extremely important, but it is also very extensive. As a result, many ambiguities or errors can arise when naming resources. This guide describes the installation and configuration of Azure Naming Tool step-by-step on a Docker container.
Exchange Online: Mail encryption with Information Rights Management (IRM)
Confidential information such as contracts, financial reports, employee or customer data is often exchanged via email. These emails are mostly not encrypted. With Information Rights Management (IRM), encrypted emails can be sent and received between people inside and outside your organization. Sent emails and their replies are encrypted automatically with transport rules or manually from Exchange Online email client (Outlook and Outlook.com). Information Rights Management (IRM) ensures that only intended recipients can open and read the message. It is also possible to prevent emails from being forwarded, printed or parts of them copied. Message encryption works with Outlook, Outlook.com, Gmail and many other popular email services.
Disabling Basic Auth: Microsoft 365 SMTP Relay for Non-TLS Devices
As of October 1, 2022, basic athentication (legacy authentication) will be disabled for EWS, RPS, POP, IMAP, MAPI, RPC, OAB, SMTP AUTH, and EAS protocols in Exchange Online. The basic authentication is a big security issue, since a user name and password are already sufficient for sign in. After deactivating basic authentication, modern authentication (based on OAuth 2.0) becomes active. Modern authentication requires a second factor (multi-factor authentication).