<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Azure on sekureco42</title><link>https://sekureco42.ch/tags/azure/</link><description>Recent content in Azure on sekureco42</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>&amp;copy; 2025 rOger Eisenecher</copyright><lastBuildDate>Fri, 22 Nov 2024 16:34:12 +0100</lastBuildDate><atom:link href="https://sekureco42.ch/tags/azure/index.xml" rel="self" type="application/rss+xml"/><item><title>Split log streams into Analytics and Auxiliary Table</title><link>https://sekureco42.ch/posts/auxiliary-logs/split-log-streams-into-analytics-and-auxiliary-table/</link><pubDate>Fri, 22 Nov 2024 16:34:12 +0100</pubDate><guid>https://sekureco42.ch/posts/auxiliary-logs/split-log-streams-into-analytics-and-auxiliary-table/</guid><description>&lt;p>In the last article we found out that KQL transformation at ingestion time is not available for Auxiliary Logs. But in real cases you want to have the ability to send selective log lines to Analytics while sending the rest to Auxiliary. In this article we will discover the possibilities.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/auxiliary-logs/split-log-streams-into-analytics-and-auxiliary-table/featured.png"/></item><item><title>Remap column names in Data Collection Rules (DCR)</title><link>https://sekureco42.ch/posts/auxiliary-logs/remap-column-names-in-data-collection-rule/</link><pubDate>Thu, 21 Nov 2024 07:46:12 +0100</pubDate><guid>https://sekureco42.ch/posts/auxiliary-logs/remap-column-names-in-data-collection-rule/</guid><description>&lt;p>In real world scenarios you have a data source with field names which are not identical to those in your table. Beside of renaming the fields in your agent which sending logs also Data Collection Rules provide the ability to map fields with &lt;code>transformkql&lt;/code>.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/auxiliary-logs/remap-column-names-in-data-collection-rule/featured.png"/></item><item><title>Auxiliary Logs in Azure Log Analytics</title><link>https://sekureco42.ch/posts/auxiliary-logs/azure-log-analytics-with-auxiliary-log-tables/</link><pubDate>Wed, 13 Nov 2024 17:29:12 +0100</pubDate><guid>https://sekureco42.ch/posts/auxiliary-logs/azure-log-analytics-with-auxiliary-log-tables/</guid><description>&lt;p>Microsoft provides a new type of Log Analytics tables called Auxiliary Logs. Currently this is in Public Preview and I did some lab testing which I documented in this blog post.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/auxiliary-logs/azure-log-analytics-with-auxiliary-log-tables/featured.png"/></item><item><title>Enterprise Attack Surface Management (EASM) - Summary</title><link>https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-summary/</link><pubDate>Tue, 14 May 2024 13:12:15 +0100</pubDate><guid>https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-summary/</guid><description>&lt;p>Microsoft provides an Enterprise Attack Surface Management (EASM) tool. In this blog series I want to disover the tool and the possibilities. This is part 3 of this series and covers my conclusions.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-summary/featured.png"/></item><item><title>Enterprise Attack Surface Management (EASM) - Tuning</title><link>https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-tuning/</link><pubDate>Thu, 09 May 2024 14:29:15 +0100</pubDate><guid>https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-tuning/</guid><description>&lt;p>Microsoft provides an Enterprise Attack Surface Management (EASM) tool. In this blog series I want to disover the tool and the possibilities. This is part 2 of this series and covers tuning..&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-tuning/featured.png"/></item><item><title>Enterprise Attack Surface Management (EASM) - Activation and a first look</title><link>https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-intro/</link><pubDate>Thu, 02 May 2024 18:29:15 +0100</pubDate><guid>https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-intro/</guid><description>&lt;p>Microsoft provides an Enterprise Attack Surface Management (EASM) tool. In this blog series I want to disover the tool and the possibilities. This is part 1 of an upcoming series.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/enterprise-attack-surface-management/easm-intro/featured.png"/></item><item><title>Azure Batch and how to avoid misuse</title><link>https://sekureco42.ch/posts/azure-batch-mitigation/</link><pubDate>Tue, 23 Apr 2024 18:22:15 +0100</pubDate><guid>https://sekureco42.ch/posts/azure-batch-mitigation/</guid><description>&lt;p>Azure Batch is quite powerful tool if you want to scale compute intensive tasks in your environment due it lets you manage scaled workload in Azure. This article will present counter measure to reduce the risk of misuse.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/azure-batch-mitigation/featured.png"/></item><item><title>Microsoft Defender for Office 365 &amp; Least Privileges</title><link>https://sekureco42.ch/posts/microsoft-defender-for-office-365-least-privileges/</link><pubDate>Thu, 12 Oct 2023 18:22:15 +0100</pubDate><guid>https://sekureco42.ch/posts/microsoft-defender-for-office-365-least-privileges/</guid><description>&lt;p>If using Microsoft Defender for Office 365 (MDO) as a Security Analyst and want to mitigate stuff (eg. add a domain to the Tenant Level Allow/Block list) you have an issue with the current role model Microsoft provides.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/microsoft-defender-for-office-365-least-privileges/featured.png"/></item><item><title>Microsoft Defender for Endpoint Asset Rules</title><link>https://sekureco42.ch/posts/microsoft-defender-for-endpoint-automate-tagging/</link><pubDate>Wed, 09 Aug 2023 15:55:15 +0100</pubDate><guid>https://sekureco42.ch/posts/microsoft-defender-for-endpoint-automate-tagging/</guid><description>&lt;p>If using Microsoft Defender for Endpoint (MDE) often you need to tag devices according some rules. In the past this was a manual task or you automated it by using the API. Now Microsoft provides a way to tag systems automatically according rules.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/microsoft-defender-for-endpoint-automate-tagging/featured.png"/></item><item><title>Add automatically Catch-All addresses as Send-from addresses in Exchange Online</title><link>https://sekureco42.ch/posts/add-automatically-catch-all-addresses-as-send-from-addresses-in-exo/</link><pubDate>Wed, 19 Apr 2023 07:59:15 +0100</pubDate><guid>https://sekureco42.ch/posts/add-automatically-catch-all-addresses-as-send-from-addresses-in-exo/</guid><description>&lt;p>In previous post I wrote about several possibilities to automate tasks in Azure. In this post I will show you an additional possibility to automate tasks in a cloud native environment with the help of &lt;code>Automation Account&lt;/code>.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/add-automatically-catch-all-addresses-as-send-from-addresses-in-exo/featured.png"/></item><item><title>Microsoft Defender for Endpoint API with Logic App</title><link>https://sekureco42.ch/posts/microsoft-defender-for-endpoint-api-with-logic-app/</link><pubDate>Mon, 20 Mar 2023 20:06:15 +0100</pubDate><guid>https://sekureco42.ch/posts/microsoft-defender-for-endpoint-api-with-logic-app/</guid><description>&lt;p>In another post I already wrote about managed identities and using API. There I also showed how to adapt the required permissions. In this post you will see how to set up required permissions for Microsoft Defender for Endpoint (internally called &lt;code>WindowsDefenderATP&lt;/code>).&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/microsoft-defender-for-endpoint-api-with-logic-app/featured.png"/></item><item><title>Graph API with Logic App</title><link>https://sekureco42.ch/posts/graph-api/graph-api-using-logic-app/</link><pubDate>Wed, 15 Mar 2023 07:51:15 +0100</pubDate><guid>https://sekureco42.ch/posts/graph-api/graph-api-using-logic-app/</guid><description>&lt;p>In the first part of this serie we checked the basics of the Graph API. Now in this part we will use Logic App to query the API. This opens new way to automate tasks.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/graph-api/graph-api-using-logic-app/featured.png"/></item><item><title>Nextcloud SSO with Azure Active Directory (AAD)</title><link>https://sekureco42.ch/posts/nextcloud-sso-with-azure-active-directory/</link><pubDate>Wed, 22 Feb 2023 11:00:15 +0100</pubDate><guid>https://sekureco42.ch/posts/nextcloud-sso-with-azure-active-directory/</guid><description>&lt;p>Nextcloud is a file sharing platform like Sharepoint. Providing SSO for this application for your Azure Active Directory users is easy - especially if you know which SAML properties you have to setup on both ends, Nextcloud and AAD. This article shows you how to do it.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/nextcloud-sso-with-azure-active-directory/featured.png"/></item><item><title>Azure Cross Tenant MFA Trust Settings</title><link>https://sekureco42.ch/posts/azure-cross-tenant-mfa-trust-setting/</link><pubDate>Fri, 17 Feb 2023 09:57:15 +0100</pubDate><guid>https://sekureco42.ch/posts/azure-cross-tenant-mfa-trust-setting/</guid><description>&lt;p>To have MFA enabled also in a B2B scenario is important. But it could lead to two MFA prompts which could lead to the &lt;a href="https://builtin.com/cybersecurity/mfa-fatigue" target="_blank" rel="noopener">MFA fatigue&lt;/a> &lt;span class="text-xs">
&lt;span class="inline-block icon">
&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512">&lt;!--! Font Awesome Pro 6.2.1 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license (Commercial License) Copyright 2022 Fonticons, Inc. -->&lt;path fill="currentColor" d="M320 0c-17.7 0-32 14.3-32 32s14.3 32 32 32h82.7L201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L448 109.3V192c0 17.7 14.3 32 32 32s32-14.3 32-32V32c0-17.7-14.3-32-32-32H320zM80 32C35.8 32 0 67.8 0 112V432c0 44.2 35.8 80 80 80H400c44.2 0 80-35.8 80-80V320c0-17.7-14.3-32-32-32s-32 14.3-32 32V432c0 8.8-7.2 16-16 16H80c-8.8 0-16-7.2-16-16V112c0-8.8 7.2-16 16-16H192c17.7 0 32-14.3 32-32s-14.3-32-32-32H80z"/>&lt;/svg>
&lt;/span>
&lt;/span>
syndrom. In this post I will show you how you could reduce MFA prompts.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/azure-cross-tenant-mfa-trust-setting/featured.png"/></item><item><title>Azure Application Proxy</title><link>https://sekureco42.ch/posts/azure-application-proxy/</link><pubDate>Wed, 08 Feb 2023 15:23:15 +0100</pubDate><guid>https://sekureco42.ch/posts/azure-application-proxy/</guid><description>&lt;p>Azure has a nice solution to bring on-prem web based applications safely into the internet: Application Proxy is the solution.&lt;/p>
&lt;!-- more -->
&lt;h2 class="relative group">Introduction
&lt;div id="introduction" class="anchor">&lt;/div>
&lt;/h2>
&lt;p>Often companies have on-prem web applications which should be accessible by Azure users. Azure provides a possiblity to bring such applications savely to the internet. The solution is called Application Proxy.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/azure-application-proxy/featured.png"/></item><item><title>Graph API with PowerShell</title><link>https://sekureco42.ch/posts/graph-api/graph-api-using-powershell/</link><pubDate>Thu, 19 Jan 2023 15:07:15 +0100</pubDate><guid>https://sekureco42.ch/posts/graph-api/graph-api-using-powershell/</guid><description>&lt;p>In the first part of this serie we checked the basics of the Graph API. Now in this part we will use a dedicated PowerShell module to explore the API further more.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/graph-api/graph-api-using-powershell/featured.png"/></item><item><title>Graph API Introduction</title><link>https://sekureco42.ch/posts/graph-api/introduction/</link><pubDate>Thu, 19 Jan 2023 14:07:15 +0100</pubDate><guid>https://sekureco42.ch/posts/graph-api/introduction/</guid><description>&lt;p>If you are using Microsoft Azure - more specifically the SaaS products like Exchange Online, SharePoint Online or Teams you have the opportunity to get many information through the Graph API. In this article you will get a short introduction into the Graph API.&lt;/p></description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sekureco42.ch/posts/graph-api/introduction/featured.png"/></item></channel></rss>