Creating IAM User Click on “Users” in the left navigation menu and then click on “Add user” button. Enter a name for the user in the “User name” field. Select the “AWS Management Console access” checkbox to grant console access to the user. Create a custom password for the user …
Log in to your AWS account using the root user credentials. Navigate to the IAM (Identity and Access Management) service in the AWS Management Console. Click on the “Activate MFA on your root account” button, which will be displayed prominently on the IAM dashboard if MFA is not currently enabled …
Create An IAM User With Console Access Type Go To IAM Dashboard > Users > Add User Input User name in user name box for lab purpose let’s say it as “Console_User” Under Access Type check AWS Management Console access Under Console password check Custom Password > input password of your choice Under Require password reset uncheck the box For lab module, we won’t …
Prerequisites Create an Azure Automation Account Create a Linux virtual machine in the Azure portal Import runbooks from GitHub with the Azure portal In the Azure portal, open your Automation account. Select Runbooks blade under Process Automation. Click Import a runbook in the Runbooks page. In the Import a runbook page, you can either import a file stored on …
Prerequisites Create an Azure Automation Account Create a Linux virtual machine in the Azure portal Enable a virtual machine In the Azure portal, navigate to Automation accounts. From the list of Automation accounts, select an account. From the left pane of the Automation account, select State configuration (DSC). Click Add to open the VM select page. …
From the Azure portal menu, or from the Home page, select Create a resource. In the Search box, enter Key Vault. From the results list, choose Key Vault. On the Key Vault section, choose Create. On the Create key vault section provide the following information: Name: A unique name is required. For this quickstart, we use Contoso-vault2. Subscription: Choose …
Enable Defender for Containers for your subscription. Defender for Containers is now ready to scan images in your registries. View and remediate findings as explained below. To view the findings, open the Recommendations page. Select the recommendation. Select a specific registry to see the repositories within it that have vulnerable repositories. Select a …
Enable JIT on your VMs from Microsoft Defender for Cloud Open the Workload protections dashboard and from the advanced protection area, select Just-in-time VM access. The Just-in-time VM access page opens with your VMs grouped into the following tabs: Configured – VMs that have been already been configured to support just-in-time VM access. For each …
From Defender for Cloud’s menu, select Regulatory compliance to open the regulatory compliance dashboard. Here you can see the compliance standards currently assigned to the currently selected subscriptions. From the top of the page, select Manage compliance policies. The Policy Management page appears. Select the subscription or management group for which you want …
From Defender for Cloud’s menu, open Environment settings. Select the relevant subscription. In the Auto provisioning page, set the status of auto provisioning for the Log Analytics agent to On. From the configuration options pane, define the workspace to use. Select Apply in the configuration pane. To enable auto provisioning of an extension other than the …
Sign in to the Azure portal. Search for and select Microsoft Defender for Cloud. From Defender for Cloud’s main menu, select Environment settings. Select the subscription or workspace that you want to protect. Select Enable all to enable all of the plans for Defender for Cloud. Select Save. Search for and select Microsoft Defender for Cloud. From …
Sign into the Azure portal. From the portal’s menu, select Defender for Cloud. Defender for Cloud’s overview page opens. Defender for Cloud – Overview provides a unified view into the security posture of your hybrid cloud workloads, helping you discover and assess the security of your workloads and to identify and mitigate …
There are multiple ways to create a log query alert rule. For this tutorial, we’ll start from the Logs Events tab in the Map view. This gives a summary of the log data that’s been collected for the virtual machine. Click on Heartbeat. This opens Log Analytics, which is the primary tool to analyze log …
Create a Windows virtual machine in the Azure portal From All services in the Azure portal, select Log Analytics workspaces. Click Create to create a new workspace. On the Basics tab, select a Subscription, Resource group, and Region for the workspace. These do not need to be the same as the resource being monitored. Provide a Name that must be globally unique across …
Prerequisites: An Azure resource to monitor. You can use any resource in your Azure subscription that supports diagnostic settings. To determine whether a resource supports diagnostic settings, go to its menu in the Azure portal and verify that there’s a Diagnostic settings option in the Monitoring section of the menu. …
From metrics explorer, click New alert rule. The rule will be preconfigured with the target object and the metric that you selected in metrics explorer. The resource will already be selected. You need to modify the signal logic to specify the threshold value and any other details for the alert rule. …
Open metrics explorer Select a metric from a list of available metrics for the selected scope and namespace. Select a time range and granularity Apply dimension filters and splitting
Menu options You can access Azure Monitor features from the Monitor menu in the Azure portal. You can also access Azure Monitor features directly from the menu for different Azure services. Different Azure services might have slightly different experiences, but they share a common set of monitoring options in the Azure portal. …