Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Microsoft Azure Architect Technologies: AZ-303 Exam Prep and Beyond

You're reading from   Implementing Microsoft Azure Architect Technologies: AZ-303 Exam Prep and Beyond A guide to preparing for the AZ-303 Microsoft Azure Architect Technologies certification exam

Arrow left icon
Product type Paperback
Published in Dec 2020
Publisher Packt
ISBN-13 9781800568570
Length 548 pages
Edition 2nd Edition
Languages
Tools
Arrow right icon
Authors (3):
Arrow left icon
Sjoukje Zaal Sjoukje Zaal
Author Profile Icon Sjoukje Zaal
Sjoukje Zaal
Sjoukje Zaal Sjoukje Zaal
Author Profile Icon Sjoukje Zaal
Sjoukje Zaal
Brett Hargreaves Brett Hargreaves
Author Profile Icon Brett Hargreaves
Brett Hargreaves
Arrow right icon
View More author details
Toc

Table of Contents (25) Chapters Close

Preface 1. Section 1: Implement and Monitor Azure Infrastructure
2. Chapter 1: Implementing Cloud Infrastructure Monitoring FREE CHAPTER 3. Chapter 2: Creating and Configuring Storage Accounts 4. Chapter 3: Implementing and Managing Virtual Machines 5. Chapter 4: Implementing and Managing Virtual Networking 6. Chapter 5: Creating Connectivity between Virtual Networks 7. Chapter 6: Managing Azure Active Directory (Azure AD) 8. Chapter 7: Implementing Multi-Factor Authentication (MFA) 9. Chapter 8: Implementing and Managing Hybrid Identities 10. Section 2: Implement Management and Security Solutions
11. Chapter 9: Managing Workloads in Azure 12. Chapter 10: Implementing Load Balancing and Networking Security 13. Chapter 11: Implementing Azure Governance Solutions 14. Section 3: Implement Solutions for Apps
15. Chapter 12: Creating Web Apps Using PaaS and Serverless 16. Chapter 13: Designing and Developing Apps for Containers 17. Chapter 14: Implementing Authentication 18. Section 4: Implement and Manage Data Platforms
19. Chapter 15: Developing Solutions that Use Cosmos DB Storage 20. Chapter 16: Developing Solutions that Use a Relational Database 21. Chapter 17: Mock Exam Questions
22. Chapter 18: Mock Exam Answers
23. Assessments 24. Other Books You May Enjoy

Monitoring security

Azure manages and protects many aspects of your solutions for you; however, it is still crucial that you monitor for intrusion events either at the platform level or in your hosted applications.

To help you monitor and protect your environment, you can use the Azure Activity log.

Activity log

Every action you perform in Azure, either directly in the portal, via PowerShell, the Azure CLI, using DevOps pipelines, or even as a result of an automated task, is logged.

These logs can be viewed at the resource level, resource group level, or subscription level. The process is the same for them all, but the following is an example of how to view subscription events:

  1. Navigate to the Azure portal by opening https://portal.azure.com.
  2. In the left-hand menu, select or search for Subscriptions.
  3. Select the subscription you wish to view.
  4. In the left-hand menu, click Activity log.

As the following screenshot shows, you are presented with a list of events showing what happened, when, and who or what initiated it. Events are grouped by the operation name, and clicking on the operation will provide more granular details of the events:

Figure 1.27 – Azure Activity Logs

Figure 1.27 – Azure Activity Logs

Above the events are a series of filters to set the level you wish to view, over what time span, and a severity setting.

The severity can be filtered by Critical, Warning, Error, and Informational.

You can also add additional filters by clicking the Add Filter button, which then allows you to filter by the following properties:

  • Resource Group
  • Resource
  • Resource Type
  • Operation
  • Event Initiated By
  • Event Category

To see more detail of a particular event, follow these steps:

  1. From the list of events, expand the Operation Name group by clicking on the arrow, as shown in the previous screenshot.
  2. Now click on the event to show the summary.
  3. Click JSON to see more details of the event. The following screenshot shows an example:
    Figure 1.28 – Example event details in JSON

    Figure 1.28 – Example event details in JSON

  4. If you want to be alerted whenever this event occurs, click New Alert Rule and then create the alert as before.

Using the Event viewer and creating relevant alerts will help identify inappropriate activities within Azure, either via the console or other methods.

Monitoring security is an important and critical activity to ensure the safety of your systems and data. In the following section, we look at another equally important task—keeping control of your costs.

You have been reading a chapter from
Implementing Microsoft Azure Architect Technologies: AZ-303 Exam Prep and Beyond - Second Edition
Published in: Dec 2020
Publisher: Packt
ISBN-13: 9781800568570
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image