Ends in

Get up to $10 DISCOUNT on our AWS Solutions Architect Associate Reviewers!

azure cheat sheet

/Tag: azure cheat sheet

Azure VPN Gateway


Bookmarks Routing Connection Resiliency Pricing Validate Your Knowledge A secured hybrid cloud architecture. It is composed of gateway subnet, tunnel, and on-premises gateway. Protocols: Internet Protocol Security (IPsec) and Internet Key Exchange (IKE) VPN gateway connections: VNet-to-VNet, Site-to-Site, and Point-to-Site Create a secure connection from your on-premises network to an Azure virtual network with a site-to-site VPN. VNet-to-VNet connection automatically routes to the updated address space, if you updated the address space on the other VNet. If you need to establish a connection to your virtual network from a remote location, you can [...]

Azure VPN Gateway2022-08-13T06:09:09+00:00

Azure Load Balancer


Bookmarks Features Concepts Pricing How to Create a Load Balancer Validate Your Knowledge Distributes incoming network traffic across multiple targets. Allows you to route traffic based on source IP address and port to a destination IP address and port. Features The load balancer supports TCP/UDP-based protocols. Scales automatically as traffic increases. The load-balancing decision is based on the following tuple connection: Source IP address and port Destination IP address and port Protocol NAT allows you to control the inbound and outbound network traffic. Inbound rules -  traffic allowed to a specific virtual [...]

Azure Load Balancer2022-08-12T03:30:23+00:00

Azure Container Registry


Bookmarks Features Concepts Best Practices Tasks Tagging Network Security Pricing A service to manage your container images and related artifacts. ACR is a regional service. Features Keep track of current valid container images. Registries (SKUs) are available in three tiers: Basic, Standard, and Premium. You can use the geo-replication feature of Premium registries for advanced replication and container image distribution scenarios. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks. ACR Tasks supports quick task, automatically triggered tasks, and multi-step task Tag your containers [...]

Azure Container Registry2021-05-11T09:16:39+00:00

Azure Kubernetes Service (AKS)


Bookmarks Features Components Storage Security Pricing Versions Validate Your Knowledge An open-source tool for orchestrating and managing many container images and applications. Lets you deploy a managed Kubernetes cluster in Azure. Features Uses clusters and pods to scale and deploy applications. Kubernetes can deploy more images of containers as needed. It supports horizontal scaling, self-healing, load balancing, and secret management. Automatic monitoring of application load to determine when to scale the number of containers used. Allows you to replicate container architectures. Use Kubernetes with supported Azure regions and on-premises installations [...]

Azure Kubernetes Service (AKS)2021-07-06T13:57:36+00:00

Azure DDoS Protection


Allows you to protect your Azure resources from denial of service (DoS) attacks. DDoS protection (layers 3 and 4) offers two service tiers: Basic and Standard. Features Basic Enabled by default (free). It mitigates common network attacks. Both basic and standard protects IPv4 and IPv6 public IP addresses. Standard It has advanced capabilities to protect you against network attacks such as logging, alerting, and telemetry. Mitigates the following attacks: Volumetric attacks - flood the network layer with attacks. Protocol attacks - exploit a weakness in layers 3 and 4. Resource layer attacks - a layer 7 attack that disrupts the [...]

Azure DDoS Protection2021-02-22T09:09:30+00:00

Azure Firewall


A service that uses a static public IP address to protect your VNet resources. Azure Firewall is PCI, SOC, ISO, ICSA Labs, and HITRUST compliant. Features A stateful firewall service. You can enable forced tunneling to route Internet-bound traffic to an additional firewall or virtual network appliance. Limit outbound traffic to a given FQDN list, including wild cards. Filter any TCP/UDP protocol outbound traffic. To use FQDNs in your rules, you must enable DNS proxy. Deny the traffic of a malicious IP address with threat intelligence-based filtering. It has the highest priority rules and will always be processed first. Threat [...]

Azure Firewall2022-08-13T03:30:22+00:00

Azure Key Vault


A service that allows you to store tokens, passwords, certificates, and other secrets. You can also create and manage the keys used to encrypt your data. Features Soft delete allows a deleted key vault and its objects to be retrieved during the retention time you designate. The retention period of a deleted vault is between 7 to 90 days. With soft-delete and purge protection enabled, it will not purge a vault or object in the deleted state until the retention period has expired. You may connect to a key vault via A public endpoint in all networks A public endpoint [...]

Azure Key Vault2021-02-22T09:12:05+00:00

Microsoft Defender for Cloud


Manages all the security features of Azure. Detect vulnerabilities, restrict your exposure to threats, and quickly detect and respond to attacks. Secure Score allows you to get continuous assessment and security recommendations. It helps you to detect unusual activities and prevent threats in your PaaS workloads. Protect your virtual machines with configuration and vulnerability management, workload hardening, and server EDR. It also supports advanced monitoring to track and manage compliance & governance. Allows you to protect your resources using free or standard tiers. Concepts Defender for Cloud displays the overall secure score of your account. The higher the score, the [...]

Microsoft Defender for Cloud2022-02-07T08:19:08+00:00

Microsoft Defender for Identity


Enables you to identify, detect, and investigate advanced threats in your organization. Allows you to monitor user activities and information. Identify and investigate advanced threats throughout the entire cyber-attack kill chain: Reconnaissance - identify attempts by attackers to gain information. Compromised credentials - any attempts that compromise user credentials shall be detected. Lateral movements - attacks to gain access to sensitive accounts. Domain dominance - the attacker has the credentials to access your domain controller. Exfiltration - unauthorized data transfer.   Sources: https://www.microsoft.com/en-ww/security/business/threat-protection/identity-defender https://docs.microsoft.com/en-us/defender-for-identity/what-is

Microsoft Defender for Identity2022-02-07T07:29:52+00:00

Azure Active Directory (Azure AD)


Bookmarks Features Concepts Monitoring Security Authentication Fundamentals: The Basics Validate Your Knowledge An identity and access management service that helps you access internal and external resources. Azure AD licenses: Free, Premium P1, Premium P2 and Pay as you go Free - user and group management in your on-premises directory Premium P1 - allows access to both on-premises and cloud resources. Premium P2 - provides an additional feature called Azure AD Identity Protection. Pay as you go - offers a feature called Azure AD B2C. Features You can use Azure AD Authentication [...]

Azure Active Directory (Azure AD)2021-05-18T08:40:13+00:00

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!