Book Image

Hands-On Cloud Administration in Azure

By : Mustafa Toroman
Book Image

Hands-On Cloud Administration in Azure

By: Mustafa Toroman

Overview of this book

Azure continues to dominate the public cloud market and grow rapidly thanks to a number of recent innovations. Azure's wide range of services and support has led to a large number of customers switching to Azure cloud. Hands-On Cloud Administration in Azure starts with the basics of Azure cloud fundamentals and key concepts of the cloud computing ecosystem and services. Then, you will gradually get acquainted with core services provided by Azure, including Azure VNet, types and assignments of IP addresses, and network security groups. You will also work on creating and administering Azure Virtual Machines, types of virtual machines (VMs), and design VM solutions based on computing workloads. As you make your way through the chapters, you will explore Azure App Service, discover how to host your web apps in Azure, and monitor and troubleshoot them. In the concluding chapters, you will learn more complex and abstract services, such as Azure Storage, Azure Backup, and Azure Site Recovery. You will also get to grips with Azure SQL Databases and the SQL on Azure VM concept. By the end of this book, you will have obtained practical experience of working with Azure services and Azure administration, along with maintaining, monitoring, and securing your Azure resources.
Table of Contents (13 chapters)

Securing your identity

Securing your identity is a very important part of IT security. Most data breaches happen as a result of social engineering or phishing attacks. So, in most cases, leaked credentials are responsible for breaches.

Azure Active Directory offers a few tools to improve security, and one that stands up is multi-factor authentication (MFA). MFA requires users to provide additional security authentication after signing in. After a user provides a username and password, additional action is required to prove their identity. Many different tools can be used for additional checks, like biometric readers or card readers, but the most popular tool is a mobile device. After signing in, a user receives a notification on their mobile device and needs to provide additional confirmation. Notifications can be in the form of a phone call (the user needs to provide a code...