Defender for Servers without Azure Arc

Header for Blogpost "Defender for Cloud without Azure Arc

If you want to protect your servers from cyber threats, you may be relying on Defender for Servers from Microsoft, a leader in the Gartner Magic Quadrant. Microsoft has now announced the direct onboarding of Defender for Servers without Azure Arc and is now officially available. Direct onboarding is a new feature that allows you to add the servers you want to protect to Defender for Servers without needing Azure Arc for Servers. In this blog post, I'll explain what this means, the benefits of this option, and who can benefit from it. I will also compare the new option with Azure Arc for Servers.

Certificate-based Point to Site Azure VPN through Intune

P2S VPN through Intune header

As the business world becomes increasingly mobile, cloud services are becoming even more attractive. But what if, as is often the case, there are still dependencies on an enterprise network - on Azure, for example? The solution is obvious: a point-to-site VPN ensures communication for mobile workers. In this how-to post, I discuss how a certificate-based point-to-site VPN to an Azure VPN gateway can be automatically rolled out to mobile clients through Intune. I also discuss how certificates can be automatically issued and renewed by a Certificate Authority in combination with Intune.

Windows 365 - your computer from the Azure Cloud

As many have suspected for years, Microsoft now offers Windows 365, a computer from the Azure Cloud. Microsoft officially announced the product at Inspire 2021 and officially launched it on the second of August 2021. Windows 365 - your computer from the Azure Cloud - has been GA and available to everyone since then. In the following, you will learn more about important aspects of Windows 365.

Integration of Azure MFA in an RDS environment

Azure MFA mit RDS

This blog post explains how to set up Azure Multi-Factor Authentication for your On-Premises Remote Desktop Service (RDS) environment. The blog post is intended to help you understand and shows the most important steps for preparation as a step-by-step guide. Multi-Factor Authentication The concept of Multi-Factor Authentication (MFA) is already widely used and respected today. Such an authentication consists of several components, not ... Read more

en_GBEnglish