Azure This Week

Azure Front Door Reimagined & Azure Defender for IOT Pwned?

Episode description

Brian Roehm is back with all your Azure updates for the week! Azure Front Door has had two new tiers added, bringing in the features of both Azure CDN and Azure Web Application Firewall. A new resource, Custom IP Prefix, allows you to BYOIP addresses to Azure. And vulnerabilities discovered in Microsoft Azure Defender for IOT. Try our Brian’s new DP-203 course:

0:00 Introduction
0:21 Azure Front Door: Reimagined
1:51 BYOIP to Azure with Custom IP Prefix
2:34 Azure Defender for IOT Vulnerabilities

Get involved with Tech Bingo – but hurry, only open until April 15!

For more info on Defense In Depth check out these resources:

Join us in the Discord channel:

Series description

Azure This Week is your weekly news roundup for all things Azure. Join our expert hosts as they cover everything you need to know about the past week’s developments, keeping it short, fun and informative. Whether you’re just beginning your cloud journey, or you know your stuff, there’s something for everyone!

Hey, what's up Gurus, welcome to Azure This Week.  I'm Brian Roehm, and I'll be taking you through   what's been happening in the world of Azure. In  this episode, we'll talk about front doors, BYOIP,   and some new security vulnerabilities  that you should know about.   Starting off. Let's talk about doors, Azure  Front Door to be specific. Azure Front Door   is a content delivery network, or CDN, that  caters to both dynamic and static content.  

It was first released in 2019. And just as your  world has been turned upside down since 2019,   so has the world of cloud. Increased security  costs, the push for hybrid working models, and a   massive acceleration of digital transformation has  led to a need for a refresh of Azure Front Door.   The new Azure Front Door now has two new  tiers, standard and premium, that combine   the original features of Azure Front Door with  Azure CDN, and Azure Web Application Firewall.   It also has increased features that will help  simplify the DevOps experience, enhance security   postures, and provide a more cost effective  solution for enterprise migrations or high   performance applications. Now, if you haven't yet,  take a look and see all of the deeper benefits  

that the new Azure Front Door can provide. If you're up for a bit of fun, have a go at our   Tech Bingo here at Pluralsight. There are a bunch  of challenges on the card. And by playing along,   you'll be entered for a chance to win $1000 US  dollars. The cash prize is only available to   legal residents of the United States, Australia,  New Zealand, United Kingdom, France, Germany,   and Spain. But even if you don't live in those  places, you can still play along by scanning   the QR code on the screen, or clicking the  link in the description. But you better hurry  

though. You've only got until April 15th. Hybrid has been the story for a few years over   at Microsoft, and the next update continues  that theme. Custom IP Prefix allows you to   BYOIP or bring your own IP addresses to  Azure. When you are looking at a migration,   there's a pretty good chance that you'll wanna  retain your existing public IP addresses.   Custom IP Prefix is a resource that just went  live and allows you to bring your own public IPv4   ranges and use them like your traditional Azure  own public IP range. You can onboard these ranges  

through a variety of ways, including the portal,  PowerShell, CLI, and ARM templates. Best of all,   you will not be charged for hosting or management  of onboarded ranges that are brought to Azure.   Last up, we're gonna discuss some vulnerabilities  to IOT that were discovered by SentinelLabs that   affect both cloud and on-premise customers. The  vulnerabilities that were discovered could allow   unauthenticated attackers to remotely compromise  devices that were protected by Azure Defender   for IOT through some vulnerabilities  in Azure's password recovery mechanism.   Now these vulnerabilities were  first reported in June, 2021.  

Yep. June, 2021. So why are we talking  about 'em today? Well, the good news is   neither Microsoft nor SentielLabs were aware  of any of the vulnerabilities being exploited.   Microsoft has been hard at work and just completed  the patches for the vulnerabilities. So why talk   about this now? To me, this highlights why the  concept of Defense in Depth is so important.   A need for you to not just rely on one service  for your security needs. It doesn't really matter  

which cloud provider or system you talk about,  services have vulnerabilities from time to time.   The Defense in Depth approach greatly  reduces the risk to your environment.   So my public service announcement for this  Azure This Week, don't rely solely on your   service provider, make sure that you're taking the  appropriate security steps as outlined in Defense   in Depth to take control of your own destiny. As always, there is a lot going on in the world   of Azure, but unfortunately this is all  the time we have for this Azure This Week.   Sad to say goodbye, but I do have some good  news. Well, we'll be back next week and you  

can join David Tucker as he discusses all the new  updates going on in the world of Azure. It will   definitely be a show that you don't wanna  miss. Until then, keep being awesome Gurus.

More videos in this series

Is AI the real Web 3.0?

Have you heard our TECHnically Possible Podcast: In Azure news this week, Lars takes a look at the general availability of Azure OpenAI, Microsoft’s…

Master the Cloud with ACG

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?