Subscribe to the mailing list to receive posts updates!
Sign up for my newsletter to see new photos, tips, and blog posts. Do not worry, we will never spam you.
Problem You’ve recently cleaned up Log Analytics Workspaces that had Virtual Machines connected to it and wanted to re-add those VMs to new workspaces but notice that you see the
I recently had to perform routine patching of various Citrix ADC / NetScalers to ensure that they are up-to-date with the latest NS13.1 17.42.nc build (released Feb 23, 2022) and
In my previous post: Using Azure Change Tracking and Inventory to monitor Windows Services https://blog.terenceluk.com/using-azure-change-tracking-and/ I demonstrated how to set up Change Tracking and Inventory in Azure Automation to monitor
Having monitoring and alerting set up for failed login attempts to any identity directory services (e.g. on-premise AD and Azure AD) have always been important yet often times neglected for
In my previous post: Monitor and Alerting for an Azure Virtual Machine with Azure Monitor Terence Luk: Monitor and Alerting for an Azure Virtual Machine with Azure Monitor I demonstrated
One of the common topics I am asked about Azure is how to best monitor the resources with Azure Monitor. There isn’t really a short answer for his because Azure
As a follow up to my previous post: Creating a Service Principal to connect to Azure AD using a Certificate to authenticate https://blog.terenceluk.com/creating-service-principal-to-connect/ This post serves to demonstrate how to
As stated in the following Microsoft documentation: How Exchange Online uses TLS to secure email connections https://docs.microsoft.com/en-us/microsoft-365/compliance/exchange-online-uses-tls-to-secure-email-connections?view=o365-worldwide By default, Exchange Online always uses opportunistic TLS. Opportunistic TLS means Exchange Online
Sign up for my newsletter to see new photos, tips, and blog posts. Do not worry, we will never spam you.