<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fahad Shaikh &#8211; Kloudynet &#8211; Your trusted partner for Cloud Security and Compliance</title>
	<atom:link href="https://kloudynet.com/author/fahad/feed/" rel="self" type="application/rss+xml" />
	<link>https://kloudynet.com</link>
	<description>Leading Microsoft Security Partner &#124; Identity, Data, Cloud &#38; AI Security Experts</description>
	<lastBuildDate>Thu, 10 Sep 2020 06:55:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Azure Active Directory External Identities Licensing</title>
		<link>https://kloudynet.com/azure-active-directory-external-identities-licensing/</link>
					<comments>https://kloudynet.com/azure-active-directory-external-identities-licensing/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Shaikh]]></dc:creator>
		<pubDate>Wed, 09 Sep 2020 17:09:57 +0000</pubDate>
				<category><![CDATA[Identity & Access Management]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/?p=608</guid>

					<description><![CDATA[&#160; Hey folks! There was a very recent announcement about the new Azure Active Directory External Identities Licensing and in fact, it&#8217;s still in preview. This new announcement benefits most of the enterprise organizations that are using External Identities. Without<a href="https://kloudynet.com/azure-active-directory-external-identities-licensing/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><span style="font-family: Segoe UI;">Hey folks!<br />
</span></p>
<p><span style="font-family: Segoe UI;">There was a very recent announcement about the new <a href="https://azure.microsoft.com/en-us/pricing/details/active-directory/external-identities/">Azure Active Directory External Identities Licensing</a> and in fact, it&#8217;s still in preview. This new announcement benefits most of the enterprise organizations that are using External Identities. Without explaining much about External Identities which you can anyways read <a href="https://docs.microsoft.com/en-us/azure/active-directory/external-identities/compare-with-b2c">here</a>, let me get to the point right away<br />
</span></p>
<p><span style="font-family: Segoe UI;">Azure Active Directory (Azure AD) External Identities is a cloud-based IAM solution that secures and manages customers and partners beyond your organizational boundaries. So, let&#8217;s see what&#8217;s changed<br />
</span></p>
<p><span style="font-family: Segoe UI;"><strong>Before the licensing announcement</strong><br />
</span></p>
<p><a href="https://docs.microsoft.com/en-us/azure/active-directory/external-identities/licensing-guidance"><span style="font-family: Segoe UI;">Before this licensing announcement B2B guest user licensing</span></a><span style="font-family: Segoe UI;"> is automatically calculated and reported based on the 1:5 ratio for using P1/P2 features. Additionally, guest users can use free Azure AD features with no additional licensing requirements. Guest users have access to free Azure AD features even if you do not have any paid Azure AD licenses.<br />
</span></p>
<ul>
<li>
<div><span style="font-family: Segoe UI;">Examples: Calculating guest user licenses:</span></div>
<p><span style="font-family: Segoe UI;">Once you determine how many guest users need to access your paid Azure AD services, make sure you have enough Azure AD paid licenses to cover guest users in the required 1:5 ratio. Here are some examples:<br />
</span></p>
<ul>
<li><span style="font-family: Segoe UI;">You want to invite 100 guest users to your Azure AD apps or services and provide access management and provisioning. For 50 of those guest users, you also want to require MFA and Conditional Access, so for those features, you will need 10 Azure AD Premium P1 licenses. If you plan to use Identity Protection features with your guest users, you will need Azure AD Premium P2 licenses in the same 1:5 ratio to cover the guest users.<br />
</span></li>
<li><span style="font-family: Segoe UI;">You want to invite 60 guest users who all require MFA, so you must have at least 12 Azure AD Premium P1 licenses. You have 10 employees with Azure AD Premium P1 licenses, which would allow up to 50 guest users under the 1:5 licensing ratio. You will need to purchase two additional Premium P1 licenses to cover 10 additional guest users.<br />
</span></li>
</ul>
</li>
</ul>
<p><span style="font-family: Segoe UI;"><strong>After the licensing announcement:</strong><br />
</span></p>
<p><span style="font-family: Segoe UI;">After the licensing announcement, you will now be able to use the first 50,000 Guest users with Azure AD P1/P2 features without purchasing any additional licenses. This would mean that the first 50,000 Guest Users will be able to use your P1/P2 features like <a href="https://azure.microsoft.com/en-us/pricing/details/active-directory/">MFA, Conditional Access &amp; Identity Protection</a>. You will be charged only after you cross 50,000 MAUs which you can see <a href="https://azure.microsoft.com/en-us/pricing/details/active-directory/external-identities/">here</a><br />
</span></p>
<p><span style="font-family: Segoe UI;">Few more important points to take note of<br />
</span></p>
<ul style="margin-left: 72pt;">
<li><span style="font-family: Segoe UI;"><span style="color: #171717; background-color: white;">This billing model applies to both Azure AD guest user collaboration (B2B) and <a href="https://docs.microsoft.com/en-us/azure/active-directory-b2c/billing">Azure AD B2C tenants</a></span><br />
</span></li>
<li><span style="font-family: Segoe UI;"><span style="color: #171717; background-color: white;">Azure Active Directory (Azure AD) External Identities pricing is based on <a href="https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-identities-pricing">monthly active users</a> (MAU), which is the count of unique users with authentication activity within a calendar month</span><br />
</span></li>
<li><span style="font-family: Segoe UI;"><span style="color: #171717; background-color: white;">You will have to <a href="https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-identities-pricing">link your Azure AD Tenant to a subscription</a> to get started. After you complete these steps, your Azure subscription is billed based on your Azure Direct or Enterprise Agreement details, if applicable.</span><br />
</span></li>
</ul>
<p><span style="font-family: Segoe UI;">Hope this article helps you understand the new licensing model for External Identities. This is a very important step taken by Microsoft to encourage customers to use more external collaboration scenarios with Azure AD<br />
</span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span style="font-family: Segoe UI;">Fahad, Founder &amp; CEO, kloudynet Technologies<br />
</span></p>
<p><span style="font-family: Segoe UI;">LinkedIn: <a href="https://www.linkedin.com/in/fashaik/">https://www.linkedin.com/in/fashaik/</a><br />
</span></p>
<p><span style="font-family: Segoe UI;"><strong>Microsoft Gold Partner and Experts in Azure | Cybersecurity &amp; Governance | Intelligent Automation<br />
</strong></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/azure-active-directory-external-identities-licensing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Azure Sentinel should be your SOAR and SIEM solution?</title>
		<link>https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/</link>
					<comments>https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Shaikh]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 12:43:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/?p=529</guid>

					<description><![CDATA[6-7 Mins Read Azure Sentinel is a cloud-native Security Incident and Event Management (SIEM) solution built to provide security analysts with a powerful tool to detect and respond to cyberattacks. Azure Sentinel also contains a Security Orchestration and Automated Response<a href="https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p>6-7 Mins Read</p>
<p>Azure Sentinel is a cloud-native <strong>Security Incident and Event Management (SIEM)</strong> solution built to provide security analysts with a powerful tool to detect and respond to cyberattacks. Azure Sentinel also contains a <strong>Security Orchestration and Automated Response (SOAR)</strong> capability. But before we answer why “Azure Sentinel” its important to understand the current Threat landscape and challenges organizations are facing</p>
<p>&nbsp;</p>
<h3><strong>Current Threat Landscape:</strong></h3>
<p>NotPetya is seen as one of the worlds most sophisticated and disruptive cyberattacks that began in Europe in June 2017. NotPetya was meant for pure destruction, and although it pretended not to be a ransomware, there was no chance for the victim to restore the infected machines because the data was made indecipherable with encryption.</p>
<p>The component of NotPetya that made it so lethal was that it contained multiple lateral movement techniques to spread quickly following the initial infection. According to an assessment, the total financial damage from NotPetya attacks totaled $10 billion!</p>
<p>&nbsp;</p>
<p>Furthermore, statistics say</p>
<ul>
<li>86{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.</li>
<li>70{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy.</li>
<li>55{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of breaches originate from organized crime groups.</li>
<li>Attacks on Web apps accessed from endpoints were part of 43{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} of breaches, more than double the results from last year.</li>
</ul>
<p>&nbsp;</p>
<p>Source: <a href="https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf" target="_blank" rel="noopener noreferrer">https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf</a></p>
<p>&nbsp;</p>
<h3><strong>Security Challenges for SecOps:</strong></h3>
<p>For most organizations, the Security Operations Team (SOC) is the central hub responsible for identifying and responding to cybersecurity threats. Mitre (<a href="https://attack.mitre.org/" target="_blank" rel="noopener noreferrer">attack.mitre.org</a>) defines the SOC as “a team primarily composed of security analysis organized to detect, analyze, respond to, report on, and prevent cyber security incidents. The commonly found pattern would include</p>
<p>Tier 1 – High Speed Remediation</p>
<p>Tier 2 – Advanced Analysis, Investigation, and Remediation</p>
<p>Tier 3 – Proactive Hunting and Advanced Forensics</p>
<p>&nbsp;</p>
<p>Microsoft today has adopted the fusion center model for cyber defense operations known as Cyber Defense Operations Center (CDOC)</p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-538" src="https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-300x170.png" alt="" width="476" height="270" srcset="https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-300x170.png 300w, https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-1024x579.png 1024w, https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1-768x435.png 768w, https://kloudynet.com/wp-content/uploads/2020/07/Microsoft-CDOC-1.png 1147w" sizes="(max-width: 476px) 100vw, 476px" /></p>
<p>&nbsp;</p>
<h3><strong>Resource Challenges: </strong></h3>
<p>Staffing shortages have hit Security Operations Center especially hard for a few reasons</p>
<ul>
<li>SOCs run operations 24X7X365 and therefore require heavy investments in security personnel</li>
<li>Security analysts require unique set of knowledge and skills that are difficult to find
<ul>
<li>Understanding of common attacker techniques</li>
<li>Have strong intuition</li>
<li>Have a desire to dig into the details and volumes of alerts and logs</li>
<li>Be driven to continuously learn</li>
</ul>
</li>
</ul>
<p>With these challenges CISOs and SOC leaders are looking for solutions that make their analysts more efficient; reduce the volume of mundane, manual tasks; and provide robust automation and orchestration capabilities</p>
<p>&nbsp;</p>
<h3><strong>Security Data Challenges</strong></h3>
<p>Security teams are drowning in the volumes of data generated by the digital assets they are required to protect. IIOT devices, smart sensors, BYOD, and other devices which are connected</p>
<ul>
<li>Security teams are often required to forgo connecting data sources because of the costs associated with scaling out their SIEMs</li>
<li>Search and correlation engines cannot not handle large volumes of data and analysts’ queries</li>
<li>Static correlation rules often miss anomalies that indicated that an attacked has successfully infiltrated the system</li>
<li>Typical, early SIEM systems were not built on machine-learning models to help identify such anomalies</li>
<li>Hiring so many data scientists to build, test and deploy their own models is expensive and hard</li>
<li>Many SIEM deployments are done with a “deploy and forget mentality”. This results in analytics working on a higher number of false positives that strains personnel and makes identifying the true, high-value events difficult.</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Azure Sentinel: Cloud-native SIEM </strong></h3>
<p>Azure Sentinel has been engineered to address the SecOps challenges identified earlier in this article</p>
<ul>
<li>Automatic scaling up to meet the data and storage requirements for enterprises of any size. All the log data for Azure Sentinel is stored in an <em>Azure Log Analytics Workspace</em></li>
<li>Integrating directly with the Microsoft Threat Intelligent Security Graph to help increase the likelihood of detecting advanced threats by leveraging Microsofts and its partners intelligence</li>
<li>Integrating endpoint protection logs for early detection. Securing endpoint is the future of cybersecurity based on the data provided early in the article</li>
<li>Reducing the need for human intervention by leveraging an open and flexible automation capability for investigating and responding to alerts</li>
<li>Including the advanced anomaly detection using Microsofts machine learning algorithms (FUSION)</li>
<li>Providing dashboards and user interfaces that are intuitive to analysts and built to streamline the typical operations within an SOC</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Azure Sentinel: Core Capabilities </strong></h3>
<p>&nbsp;</p>
<p>Azure sentinel provides security teams with unprecedented visibility into their digital estates</p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-536" src="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Core-Capabilities-300x289.png" alt="" width="352" height="339" srcset="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Core-Capabilities-300x289.png 300w, https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Core-Capabilities.png 581w" sizes="(max-width: 352px) 100vw, 352px" /></p>
<p>&nbsp;</p>
<ul>
<li>Data collection and storage across all users, devices, applications, and infrastructure – whether on-premise or in the cloud</li>
<li>Threat detection that leverages Microsofts analytics and threat intelligence</li>
<li>Investigation of threats by hunting for suspicious activities at scale</li>
<li>Rapid response to incidents by leveraging built-in orchestration and automation of common tasks</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Azure Sentinel: Components </strong></h3>
<p>&nbsp;</p>
<p>The below diagram shows the major components of Azure Sentinel</p>
<p><img decoding="async" class="alignnone wp-image-535" src="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Components-300x203.png" alt="" width="414" height="280" srcset="https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Components-300x203.png 300w, https://kloudynet.com/wp-content/uploads/2020/07/Sentinel-Components.png 671w" sizes="(max-width: 414px) 100vw, 414px" /></p>
<p>&nbsp;</p>
<ul>
<li><strong>Analytics</strong>: Analytics enables you to create custom alerts using Kusto Query Language (KQL). You can further take actions on these alerts by attaching the analytics to playbooks. Playbooks are created using Azure Logic Apps</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Cases</strong>: Also called as incident, is an aggregation of all the relevant evidence for a specific investigation. It can contain one or multiple alerts, which are based on analytics that you define</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Hunting</strong>: This is a powerful tool for investigators and security analysts who need to proactively look for security threats. The searching capability is powered by Kusto Query Language</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Notebooks</strong>: By integrating Jupyter Notebooks, Azure Sentinel extends the scope of what you can do with the data that was collected. One of the major reasons for using Jupyter Notebooks is the complexity of what you are trying to do with Azure Sentinels built-in tools becomes high
<ul>
<li>When the number of queries in your investigation chain goes high</li>
<li>Doing complex KQL query gymnastics to integrate some external data or extract some specific entity type from data</li>
</ul>
</li>
</ul>
<p>Most of Azure Sentinels <a href="https://notebooks.azure.com/" target="_blank" rel="noopener noreferrer">Jupyter Notebooks</a> heavily depend on <a href="https://msticpy.readthedocs.io/en/latest/" target="_blank" rel="noopener noreferrer"><em>msticpy</em> </a>Python package which is developed by Microsofts Threat Intelligence Center</p>
<ul>
<li><strong>Data Connectors</strong>: Built-in connectors are available to facilitate data ingestion from Microsoft and partner solutions. Below is a list of some of the Microsoft and non-Microsoft connectors with Azure Sentinel. Note that this is not an exhaustive list of the built-in connectors
<ul>
<li>Amazon Web Services</li>
<li>Azure Active Directory</li>
<li>Azure Active Directory Identity Protection</li>
<li>Azure Activity</li>
<li>Azure Advanced Threat Protection</li>
<li>Azure Information Protection</li>
<li>Azure Security Center</li>
<li>Azure Security Center for IoT</li>
<li>Barracuda CloudGen Firewall</li>
<li>Barracuda Web Application Firewall</li>
<li>Check Point</li>
<li>Cisco ASA</li>
<li>Citrix Analytics (Security)</li>
<li>CyberArk (Coming soon….)</li>
<li>DNS</li>
<li>F5 BIG-IP</li>
<li>F5 Networks</li>
<li>Fortinet</li>
<li>Microsoft Cloud App Security</li>
<li>Microsoft Defender Advanced Threat Protection​</li>
<li>Microsoft web application firewall (WAF)</li>
<li>Office 365</li>
<li>Palo Alto Networks</li>
<li>Security Events</li>
<li>Threat Intelligence Platforms</li>
<li>Threat intelligence &#8211; TAXII</li>
<li>Trend Micro</li>
<li>Windows Firewall</li>
<li>Zimperium Mobile Threat Defense</li>
<li>Zscaler</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<p>If an external solution is not on data connector list, but your appliance supports saving logs as a Syslog Common Event Format (CEF), the integration with Azure Sentinel is available via CEF connector. If CEF support is not available on your appliance, but it supports calls to REST API, you can use HTTP Data Collector API to send log data to the workspace on which Azure Sentinel is enabled.</p>
<p>&nbsp;</p>
<ul>
<li><strong>Playbooks: </strong>A playbook is a collection of procedures that can be automatically executed upon an alert triggered by Azure Sentinel. Playbooks leverage Azure Logic Apps, which help you automate and orchestrate tasks/workflows.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Workspace: </strong>A log Analytics workspace is a container that includes data and configuration information. Azure sentinel uses this container to store data that you collect from the different data sources.</li>
</ul>
<p>&nbsp;</p>
<h3><strong>Conclusion: </strong></h3>
<p>&nbsp;</p>
<p>Utilizing a cloud-native SIEM will definitely reduce the integration costs and free up resources.</p>
<p>Ease of integration with telemetry data is the key to any SIEM success. Azure Sentinel offers a resilient and a straightforward way to connect data sources, without the need to any have server or storage infrastructure and going 100{9ee96c6d432e164aa8f1209d1934688fca0902a21c1f7400127c265baa8231f2} serverless.</p>
<p>With just a few clicks you can connect Sentinel to O365, Azure AD or Azure Activities and start receiving alerts immediately and get populated on the dashboards in minutes.</p>
<p>Now month-long projects on integration of O365 with legacy SIEM can be implemented in a day by onboarding to Azure Sentinel. Helps specially if customers are struggling with such integration of detection use cases to address auditors concerns.</p>
<p>All this is also true not only for collecting data from Microsoft sources. However Azure Sentinel AWS CloudTrial connector, which is based on serverless Cloud-To-Cloud connection, provides the same benefits.</p>
<p>Hope this write up gives a birds eye view of what Azure Sentinel is, its core capabilities &amp; benefits and why enterprises should be looking at Azure Sentinel as their next SOAR and SIEM solution.</p>
<p>&nbsp;</p>
<p>Fahad, Founder &amp; CEO, kloudynet Technologies</p>
<h3 class="mt1 t-18 t-black t-normal break-words">Microsoft Gold Partner and Experts in Azure | Cybersecurity &amp; Governance | Intelligent Automation</h3>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/why-azure-sentinel-should-be-your-soar-and-siem-solution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud Governance with kloudsifu to ensure reduced Cloud spend, controlled deployments and security</title>
		<link>https://kloudynet.com/cloud-governance-with-kloudsifu-to-ensure-reduced-cloud-spend-controlled-deployments-and-security/</link>
					<comments>https://kloudynet.com/cloud-governance-with-kloudsifu-to-ensure-reduced-cloud-spend-controlled-deployments-and-security/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Shaikh]]></dc:creator>
		<pubDate>Thu, 07 May 2020 22:44:30 +0000</pubDate>
				<category><![CDATA[Cloud Governance]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/?p=482</guid>

					<description><![CDATA[At Kloudynet we have had the privilege to work with some of the larger Azure customers on their cloud deployments and management in Southeast Asia. On the field, the questions we face as a team are always the same. How<a href="https://kloudynet.com/cloud-governance-with-kloudsifu-to-ensure-reduced-cloud-spend-controlled-deployments-and-security/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p>At Kloudynet we have had the privilege to work with some of the larger Azure customers on their cloud deployments and management in Southeast Asia. On the field, the questions we face as a team are always the same.</p>
<ul>
<li>How can I control the costs associated with non-Production resources left running on Azure?</li>
<li>How can I have ‘always-on’ visibility to my Azure spends?</li>
<li>How can we ensure our deployments meet Azure security best practices, and how can we protect our Production workloads? How can I ensure ours or customers data on Azure is safe?</li>
<li>How can we ensure a controlled deployment of resources on Azure? Resources are deployed with an approval process. And only approved resources are allowed to be deployed</li>
<li>How can I reduce my time to deploy resources on Azure?</li>
<li>How can I ensure that the right people have the right access to my Azure resources?</li>
<li>&#8220;I&#8217;m concerned about data sovereignty; how can I ensure that my data and systems meet our regulatory requirements?&#8221;</li>
</ul>
<p>On the Cloud (Azure in this case) the cost meter is “always-on”. Hence its important that only the required resources are always running and deployed on Azure. Cost is not the only concern for organizations who either are already running their workloads or are looking to move their workloads to Azure. The Microsoft Cloud Adoption Framework encourages organizations to take a more holistic approach and look at Cloud Governance to ensure a well-managed cloud. The five disciplines of Cloud Governance are Cost Management, Security Baseline, Resource Consistency, Identity Baseline and Deployment Acceleration</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-483 size-full" src="https://kloudynet.com/wp-content/uploads/2020/05/03.png" alt="" width="726" height="366" srcset="https://kloudynet.com/wp-content/uploads/2020/05/03.png 726w, https://kloudynet.com/wp-content/uploads/2020/05/03-300x151.png 300w" sizes="auto, (max-width: 726px) 100vw, 726px" /></p>
<p>You can read more about Microsoft CAF here</p>
<p><a href="https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/" target="_blank" rel="nofollow noopener noreferrer">https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/</a></p>
<p>Our new product <em>kloudsifu</em> addresses the above cloud concerns aligning to Cloud Governance though the Microsoft Cloud Adoption Framework</p>
<p>The framework kloudsifu follows is as below</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-484 size-full" src="https://kloudynet.com/wp-content/uploads/2020/05/02.png" alt="" width="595" height="325" srcset="https://kloudynet.com/wp-content/uploads/2020/05/02.png 595w, https://kloudynet.com/wp-content/uploads/2020/05/02-300x164.png 300w, https://kloudynet.com/wp-content/uploads/2020/05/02-235x127.png 235w" sizes="auto, (max-width: 595px) 100vw, 595px" /></p>
<p><em>kloudsifu</em> is a web platform which seamlessly integrates with your Azure environment and helps organizations enforce governance, limit cloud spends, and enhance security by using approval workflows and automated deployments. kloudsifu uses the Azure native blueprints and policies to ensure a cost controlled and compliant deployment even before any resources are deployed on Azure.</p>
<p>Below are a few benefits but not limited to we give our customers who are using kloudsifu to deploy Azure resources</p>
<p>&#8211;     All the deployments in Azure are controlled by <strong><em>approval workflows</em></strong> even before they are deployed. Saves cost by restricting only required resources to be deployed in the cloud environment</p>
<p>&#8211;     <strong><em>Integration with Azure Cost Management</em></strong> to apply advanced features like deployment not exceeding a specific budget limit</p>
<p>&#8211;     <strong><em>Auto removal of any dev/test deployments</em></strong> once the resources are not required, saving costs</p>
<p>&#8211;     <strong><em>100{242c517669925a073d705e22a169fb98ddbf0859d961064402a4c1a034274d1e} compliant deployments</em></strong> on Dev/Test and production environments with mandatory policies and security settings</p>
<p>&#8211;     All deployments use <strong><em>resource consistency</em></strong> so they can be easily managed, discoverable and enables repeatable deployments</p>
<p>&#8211;     <strong><em>Faster deployments</em></strong> to the cloud with automated processes</p>
<p>&#8211;     IT teams can focus on <strong><em>more important tasks</em></strong> while kloudsifu takes care of secure Azure deployment</p>
<p>&#8211;     All deployed resources are <strong><em>appropriately tagged</em></strong> for other reporting or chargeback purposes</p>
<p>&#8211;     <strong><em>Full visibility</em></strong> on who, when, why, for how long and at what cost on all resources in the environment</p>
<p>&#8211;     Deployments to a <strong><em>single or multiple Azure environment</em></strong> using the same deployment blueprints</p>
<p>The roadmap for <em>kloudsifu</em> is super exciting and we promise to deliver new features fast to help customers better manage their cloud costs, security and governance</p>
<p>Do reach out at <a href="http://mailto:sales@kloudynet.com/" target="_blank" rel="nofollow noopener noreferrer">sales@kloudynet.com</a> for a demo and know more</p>
<p><strong>Fahad, CEO, kloudynet Technologies</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/cloud-governance-with-kloudsifu-to-ensure-reduced-cloud-spend-controlled-deployments-and-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ending the password change drama by moving to Windows Hello for Business password-less in Organizations</title>
		<link>https://kloudynet.com/windows-hello-passwordless/</link>
					<comments>https://kloudynet.com/windows-hello-passwordless/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Shaikh]]></dc:creator>
		<pubDate>Fri, 17 Apr 2020 07:35:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/?p=360</guid>

					<description><![CDATA[Passwords are messy! They are hard to remember, easy to hack and not secured. Microsoft sees over 10 million username/password pair attacks every day. And many IT help desks in the organizations spend their significant time responding to password reset<a href="https://kloudynet.com/windows-hello-passwordless/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p>Passwords are messy! They are hard to remember, easy to hack and not secured. Microsoft sees over 10 million username/password pair attacks every day. And many IT help desks in the organizations spend their significant time responding to password reset requests from employees</p>
<p>Moving passwordless using Windows Hello for Business is the most secured way forward and end this drama. Password-less authentications is convenient for users as well as secured.</p>
<p>However, there are some considerations before password-less authentication is deployed into the organizations where the devices are joined to on-premise Active directory. Windows Hello for Business has two deployment models: Hybrid and On-premises. Each deployment model has two trust models: Key trust or certificate trust. Below are the ways WHFB password-less can be deployed</p>
<ul>
<li>Hybrid Azure AD Joined Key Trust Deployment (Devices which are joined to on-premise AD as well as Azure AD)</li>
<li>Hybrid Azure AD Joined Certificate Trust Deployment (Devices which are joined to on-premise AD as well as Azure AD)</li>
<li>Azure AD Join Single Sign-on Deployment Guides (Devices which are only joined to Azure AD)</li>
<li>On Premises Key Trust Deployment (Devices which are only joined to on-premise AD)</li>
<li>On Premises Certificate Trust Deployment (Devices which are only joined to on-premise AD)</li>
</ul>
<p>Hybrid Azure AD joined Key Trust Deployment is the most common trust model deployed which we will be discussing further in this article. If you want to know more about all the deployment methods and trust model, please go through the document <a href="https://docs.microsoft.com/en-us/azure/security/fundamentals/ad-passwordless" target="_blank" rel="nofollow noopener noreferrer">here</a></p>
<p>However, there are some critical pre-requisites and considerations before you deploy Windows Hello for Business using Hybrid Azure AD joined Key Trust</p>
<ul>
<li>Hybrid Windows Hello for business needs two directories: on-premises Active Directory and a cloud Azure Active Directory.</li>
<li>The minimum required domain functional and forest functional levels for Windows Hello for Business deployment is Windows Server 2008 R2</li>
<li>A hybrid Windows Hello for Business deployment needs an Azure Active Directory subscription. The hybrid key trust deployment does not need a premium Azure Active Directory subscription.</li>
<li>Key trust deployment needs adequate number of Windows Server 2016 domain controllers in each site where users authenticate using Windows Hello for business.</li>
</ul>
<p><em>NOTE: Windows Hello for Business Key Trust based password-less will work even if you have a single Windows Server 2016 Domain Controller deployed in the entire domain. However, that would not be enough to take the authentication traffic if the numbers of users are high and a thorough sizing exercise is required.</em></p>
<p><em>NOTE: If you have limitations to have any Windows Server 2016 domain controllers, you can fall back to using </em><a href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust" target="_blank" rel="nofollow noopener noreferrer"><em>Windows Hello for Business Certificate Trust</em></a><em> based deployment</em></p>
<ul>
<li>The devices that will be enabled for password-less should be hybrid domain joined. For that to happen the devices should be synced to Azure AD via AD Connect</li>
</ul>
<p><em>NOTE: To configure Azure AD connect for Hybrid AD join you can refer to the article </em><a href="https://docs.microsoft.com/bs-latn-ba/azure/active-directory/devices/hybrid-azuread-join-managed-domains" target="_blank" rel="nofollow noopener noreferrer"><em>here</em></a></p>
<ul>
<li>The minimum required enterprise certificate authority that can be used with Windows Hello for Business is Windows Server 2012. To know more details on the certificate requirements refer to the article <a href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs#public-key-infrastructure" target="_blank" rel="nofollow noopener noreferrer">here</a></li>
<li>Your Windows 10 devices should be enrolled to Intune. If the windows 10 devices are already managed by SCCM you will have to setup co-management. Co-management requires Configuration Manager version 1710 or later.</li>
</ul>
<p><em>NOTE: You can still move to Intune standalone if you are not in a position to upgrade your SCCM to 1710 or later. The pros and cons of moving your devices to Intune standalone calls for a separate blog on its own.</em></p>
<p>Users will still need to fall back to passwords in a few scenarios. Like in cases the users forget their Windows Hello PIN and want to reset or they want to access other AD integrated applications in the environment. To eliminate the usage of passwords below are some of the steps to be taken:</p>
<p>o   Set all the users to <strong>password never expires</strong>. Password changes do more harm than good anyways. They drive users to choose weaker passwords, re-use passwords, or update old passwords in ways that are easily guessed by hackers.</p>
<p>Microsoft recommends to set all users to <a href="https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf" target="_blank" rel="nofollow noopener noreferrer">Password never expires</a> and use conditional access instead!</p>
<p>o   User should use <a href="https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks" target="_blank" rel="nofollow noopener noreferrer">Self Service Password Resets</a> in case they want to fall back to passwords. In this way the users can still reset their passwords in case they forget them without calling the IT or help desk. Ensure you have password write back enabled in the environment.</p>
<p>o   All the applications should move to SSO so there is less or no usage of passwords. They may still need to use passwords for applications accessed from a non-corporate device.</p>
<p>o   Put strong conditional access policies and MFA for accessing corporate applications.</p>
<p>Hope this helps summarize deploying Windows Hello for Business password-less authentication using Key Trust model.</p>
<p>If you still have questions on Windows Hello for Business, you can refer to the <a href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-faq" target="_blank" rel="nofollow noopener noreferrer">FAQ</a> or reach out to me.</p>
<p><strong>Fahad, Founder and CEO, kloudynet</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/windows-hello-passwordless/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Kaizala and Teams are different products. Heres why!</title>
		<link>https://kloudynet.com/microsoft-kaizala/</link>
					<comments>https://kloudynet.com/microsoft-kaizala/#comments</comments>
		
		<dc:creator><![CDATA[Fahad Shaikh]]></dc:creator>
		<pubDate>Tue, 03 Mar 2020 02:28:44 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://www.kloudynet.com/kloudynet/?p=1</guid>

					<description><![CDATA[Microsoft Kaizala was launched with O365 worldwide. https://techcommunity.microsoft.com/t5/Microsoft-Kaizala-Blog/Microsoft-Kaizala-rolls-out-to-Office-365-customers-globally-and/ba-p/394298 On the field this brings in a lot of discussions with customers on Microsoft Kaizala and Teams. Have you wondered why Microsoft introduced Kaizala when Teams already exists? Why should your organization<a href="https://kloudynet.com/microsoft-kaizala/">...[...]</a>]]></description>
										<content:encoded><![CDATA[<p>Microsoft Kaizala was launched with O365 worldwide.</p>
<p>https://techcommunity.microsoft.com/t5/Microsoft-Kaizala-Blog/Microsoft-Kaizala-rolls-out-to-Office-365-customers-globally-and/ba-p/394298</p>
<p>On the field this brings in a lot of discussions with customers on Microsoft Kaizala and Teams.</p>
<p>Have you wondered why Microsoft introduced Kaizala when Teams already exists? Why should your organization be using Kaizala since you are already on Teams? What are the differences between the two, and when should we use what?</p>
<p>Read on as we clarify:</p>
<p><strong>Microsoft Kaizala:</strong></p>
<ul>
<li>Best alternative for WHATSAPP for organizations. Much secured and centralized administration</li>
<li>Kaizala secures users that are outside the organizations directory or have any Azure Active Directory guest accounts. This enables users being added to your organizational groups even with just their mobile phones numbers. Typical users would be remote field workers only having a mobile phone with an internet connection</li>
<li>Flexible group types: hub and spoke, hierarchical and public groups.</li>
<li>Scales up to millions of users in a group. Typical use case is a public group that allows millions of users to join.</li>
<li>Easy onboarding of users with phone numbers.</li>
<li>Built-in action cards for surveys, polls and announcements, jobs, training and tasks</li>
<li>Offline access, low latency, optimized for slow networks</li>
<li>Simple business user deployment, admin and reporting</li>
</ul>
<p><em><strong>Customer scenarios for Kaizala:</strong></em></p>
<p>Manage tasks and automation workflows that span outside the organization Eg: Toll booth maintenance check by remote workers in far fetched locations</p>
<p>Cater to scenarios where there is high turn-over of a workforce. Example a taxi drivers group where the drivers keep changing taxi companies they drive for</p>
<p>Phone number as a primary identity. No email address required. For users who don’t have an email address and just a mobile phone with a number</p>
<p>Offline scenarios like flights crews and remote locations</p>
<p>Simple, fast, business-led deployment and administration</p>
<p><strong>Microsoft Teams:</strong></p>
<ul>
<li>Teams is a hub for teamwork.</li>
<li>Deep integration with office 365 &#8211; SPO, Groups, Office Apps, Microsoft Flow, Graph API</li>
<li>Advanced collab &amp; communications: Intelligent meetings, enterprise voice</li>
<li>Managing shifts and task management</li>
<li>Advanced IT administration</li>
</ul>
<p><em><strong>Customer scenarios for Teams:</strong></em></p>
<ul>
<li>Digital workspace for teams across the organization, and external guests (mobile + desktop).</li>
<li>In-depth communication within an organization and with federated partners</li>
<li>Firstline environments with need for deep Office integration or shift management</li>
<li>Purpose-built vertical solutions: e.g. Care coordination in healthcare</li>
<li>Advanced IT administration</li>
</ul>
<p>Real life scenario solved using Kaizala for a customer for Toll Plaza maintenance</p>
<ul>
<li>Manual Process:</li>
</ul>
<ol>
<li>Maintenance Team visits Toll plaza</li>
<li>Goes through the checklist and updates physical checklist</li>
<li>Checklist is then submitted to the office</li>
</ol>
<ul>
<li>Automated process using Microsoft Kaizala:</li>
</ul>
<ol>
<li>Kaizala Custom Action Card is used to fill up the maintenance checklist. Card enforces to input location &#8211; to ensure technicians are at the locations during inspection</li>
<li>All information including pictures from inspection of the plazas uploaded onto SharePoint online using the same custom action card</li>
<li>Supervisor notified of Toll Inspection in real time via email</li>
<li>Productivity &amp; efficiency of maintenance staff measured using time stamps on custom action card</li>
</ol>
<p>Hope this helps guide you as to when you should be using Microsoft Kaizala over Microsoft Teams!</p>
<p>kloudynet Technologies is a High Potential Kaizala partner for Southeast Asia, and has worked on various scenarios customizing Kaizala for end users</p>
<p><strong>&#8211; Fahad, Founder, kloudynet Technologies</strong></p>
<p>sales@kloudynet.com</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kloudynet.com/microsoft-kaizala/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
