Microsoft Ignite The Tour Amsterdam

Last week I’ve visited Microsoft Ignite The Tour in Amsterdam. Two realy great days with a lot of new information, presentations and knowledge. There also where a couple of new announcements from Microsoft.

IMG_7579

IMG_7612

My focus was Azure IaaS, security, governance and cost control within Azure. Of course there was a lot more to see, but this event was only 2 days, so I’ve had to make choices!

Microsoft has published the slide decks online, so you can download these now! (click)

Hoppefully I’ll be present the next year at this great event!!

Recordings webinar How to Supercharge your Infrastructure with Azure IaaS

Last month there was a webinar hosted by Altaro Software about ‘How to Supercharge your Infrastructure with Azure IaaS’. In this great webinar, Thomas Maurer (Senior Advocate on the Azure Engineering Team) and Andy Syrewicze shows you how to get the most out of Azure IaaS.

Very powerfull webinar, with a lot of fun and live demos! They also tackled several important use cases suggested by the IT community!

Special thanks to Altaro Software. Also thanks to Thomas and Andy for this great webinar!

Restricting RDP access to Azure virtual machines

By default, every VM you’v e created within Azure has RDP (Remote Desktop Protocol) on port 3389 enabled. You can access you VM from anywhere in the world.

You can restrict RDP access on just that IP addresses you want, so you can limit the access. So for example, you can limit your company IP address and maybe you home address to access the specific VM in Azure.

To restrict access, I’ve created a NSG (Network Seciruty Group) with the following configuration:

1.) Create a new Inbound security rule with a priority of 4095 (every digit below the default of 65000 is fine!!)
2.) Configure the following rule:

Priority: 4096
Name: Deny-RDP-Access
Source: Service Tag
Source service tag: Internet
Source port ranges: *
Destination: VirtualNetwork
Destination port ranges: 3389
Protocol: TCP
Action: Deny

3.) Configure a second rule:

Priority: 4095
Name: Allow-RDP-Access
Source: IP Addressess
Source IP Addressess/CIDR ranges: YOUR IP ADDRESSESS
Source port ranges: *
Destination: Any
Destination port ranges: 3389
Protocol: TCP
Action: Allow

image

Now you can test your new configuration. RDP access is only allowed from your custom IP addressess!!

Altaro Dojo forums

Altaro has kicked off the Altaro Dojo forums. The forum brings fellow IT pros together, connect the community and enable members to learn and share their knowledge with one another.

Some info on how people can use the forum can be found here.

Please register on the forum and share your knowledge with other IP pros! Let’s make some community!

I want to become a ‘Ninja’. Let’s go!!!

Microsoft Ignite 2018 – Book of News

Ignite Book of News: Your Guide to All the News at Microsoft Ignite

This document contains information on all the announcements made at Microsoft Ignite 2018, including:

  • Microsoft 365;
  • Microsoft Azure IaaS;
  • Azure SQL;
  • SQL Server 2019;
  • Security;
  • Artificial Intelligence (AI);
  • SQL Server 2019;
  • Internet of Things (IoT);
  • Windows Server 2019;
  • Windows Virtual Desktops;
  • Windows Admin Center;
  • Hyper-V;
  • Storage Space Direct (S2D);
  • And many, many, many more……

Download the full document here (or click the big picture below).

Experts Live NL 2018 Intro Movie

Last Tuesday, it was a great day again! Experts Live 2018 NL. The biggest community event in the Netherlands. Great sessions, great speakers, very high level of content, great demos and off course as always a great intro movie!! 🙂 Many thanks to the organization of Experts Live! See you next year!!

http://www.expertslive.nl