Book Image

Implementing Azure Solutions - Second Edition

By : Florian Klaffenbach, Markus Klein, Sebastian Hoppe, Oliver Michalski, Jan-Henrik Damaschke
Book Image

Implementing Azure Solutions - Second Edition

By: Florian Klaffenbach, Markus Klein, Sebastian Hoppe, Oliver Michalski, Jan-Henrik Damaschke

Overview of this book

<p>Microsoft Azure offers numerous solutions that can shape the future of any business. However, the major challenge that architects and administrators face lies in implementing these solutions. </p><p>Implementing Azure Solutions helps you overcome this challenge by enabling you to implement Azure Solutions effectively. The book begins by guiding you in choosing the backend structure for your solutions. You will then work with the Azure toolkit and learn how to use Azure Managed Apps to share your solutions with the Azure service catalog. The book then focuses on various implementation techniques and best practices such as implementing Azure Cloud Services by configuring, deploying, and managing cloud services. As you progress through the chapters, you’ll learn how to work with Azure-managed Kubernetes and Azure Container Services. </p><p>By the end of the book, you will be able to build robust cloud solutions on Azure.</p>
Table of Contents (14 chapters)

Azure Security Center

Azure Security Center is a powerful tool set to monitor and alert on security breaches of your Azure services. You can find security center in the All services view of the Azure portal:

If you would like to start with security center, you will have the chance to test it for about 60 days before you have to pay:

The POLICY & COMPLIANCE tab gives an overview of the state of the art for all enabled security features:

The RECOMMENDATIONS tab provides an overview of features that you should enable within your Azure environment. This is more or less the best practice analyzer for Azure Security. You can choose the following tabs to get a more detailed filtered view based on computer, networking, storage, identity, and security, as shown in the following screenshot:

As you can see in the Networking tab, there are recommendations for setting up firewall services or restricting resource access:

And finally, the Connected solutions...