Azure DNS: How to build and secure it using infrastructure-as-code
You’re only as strong as your weakest link. Here’s how to boost security by moving a public domain from a DNS registrar to Microsoft Azure.
Anderson Patricio is a Canadian MVP in Cloud and Datacenter Management, and Office Server and Services, besides of the Microsoft Award he also holds a Solutions Master (MCSM) in Exchange, CISSP and several other certifications. Anderson contributes to the Microsoft Community with articles, tutorials, blog posts, twitter, forums and book reviews. He is a regular contributor here at Techgenix.com, MSExchange.org, ITPROCentral.com and Anderson Patricio.org (Portuguese).
You’re only as strong as your weakest link. Here’s how to boost security by moving a public domain from a DNS registrar to Microsoft Azure.
Error messages don’t always tell you what caused the problem with Azure.. Azure services status can help you pinpoint the problem.
Want to make managing RBAC permissions at the subscription/management group level a breeze? Start using Azure DevOps service connections.
Creating a resource group with some essential components for your security team will be a big boost to your Azure environment. Here’s how to do it.
In this Quick Tip, you see that with location parameters and a variable, we can guarantee that our ARM template will always get valid regions.
When creating Azure DevOps pipelines, label stages with the environment name, and then you can leverage it when defining the template parameters section.
This Azure Quick Tip shows you how to take advantage of soft delete in Log Analytics just in case you want to restore something you recently deleted.
This Quick Tip shows you a neat little coding trick that will help you when using ARM templates in your infrastructure-as-code deployment.
Here’s how to make deploying your infrastructure-as-code easier, and dare we say, even elegant, by using Azure linked templates.
This Quick Tip shows you how to see what’s going on with your Azure VM using the Azure app on your mobile device and scanning a QR code.
Join Our Newsletter
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
Over 1,000,000 fellow IT Pros are already on-board, don't be left out!