from The Azure Podcast , on 3/23/2019 , played: 399 time(s)
Azure Stack experts from Microsoft Services, Heyko Oelrichs and Rathish Ravikumar, give us an update on Azure Stack and some valuable tips and tricks based on their real-world experiences deploying it for customers.
Resources: • Overview (https://azure.microsoft.com/en-gb/overview/azure-stack/)
• Azure Stack documentation (http://aka.ms/AzureStackDocs )
• Download and try Azure Stack Development Kit (http://aka.ms/asdk )
• Free online Azure Stack course INF240x (self-paced with 40+ hours content + ASDK-based labs) (http://aka.ms/AzSMooC )
• Free online (recorded) Azure Stack conference sessions (http://aka.ms/AzSIgnite2018 )
• Fee-based in-classroom instructor-led Azure Stack official training course 20537B (http://aka.ms/AzSMOC )
• Azure Stack Operator certification exam 70-537 (http://aka.ms/AzSExam )
• Azure Stack MSDN forum (http://aka.ms/AzSForum )
• Azure Stack Roadmap (https://azure.microsoft.com/en-us/updates/?product=azure-stack)
• Kubernetes on Azure Stack (https://docs.microsoft.com/en-us/azure/azure-stack/user/azure-stack-solution-template-kubernetes-deploy)
In Azure Security Center, adaptive application control in audit mode is now available for Azure Linux VMs. This whitelisting solution is also available for non-Azure Windows and Linux VMs and servers that are connected to Security Center.
In addition, you can now rename groups of virtual machine and server clusters in Security Center. They're still automatically named group1, group2, and so on. But you can then edit them to provide a more meaningful name to your machine cluster groups, to help you better represent those application control policy groups.
The network map in Azure Security Center now supports virtual network peering. Directly from the network map, you can view allowed traffic flows between peered virtual networks and deep dive into the connections and entities.
Azure Security Center can now learn the network traffic and connectivity patterns of your Azure workload and provide you with network security group (NSG) rule recommendations for your internet-facing virtual machines. This is called adaptive network hardening, and it's in public preview. It helps you secure connections to and from the public internet (made by workloads running in the public cloud), which are one of the most common attack surfaces.
It can be hard to know which NSG rules should be in place to make sure that Azure workloads are available only to required source ranges. These new recommendations in Security Center help you configure your network access policies and limit your exposure to attacks. Security Center uses machine learning to fully automate this process, including an automated enforcement mechanism. These recommendations also use Microsoft’s extensive threat intelligence reports to make sure that known malicious actors are blocked.
To view these recommendations, in the Security Center portal, select Networking and then Adaptive network hardening.
In the Sprint 149 Update of Azure DevOps, we added the ability to navigate to Azure Boards directly from mentions in a GitHub comment as well as adding support for Azure Boards within GitHub Enterprise.
For Azure Pipelines we enabled a new feature on GitHub pull requests that lets you run optional checks by mentioning /azp in the comment. You can also require a comment on the pull request from repository contributor before the pipeline will run giving you the ability to review code from unknown users before building.
Achieve more with Microsoft Game Stack
Expanded Jobs functionality in Azure IoT Central