Author: zigmax
-
Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
Read more: Deprecated VM alerts regarding suspicious activity related to a Kubernetes clusterHi! The following table lists the alerts that were deprecated: Alert name Description Tactics Severity Docker build operation detected on a Kubernetes node(VM_ImageBuildOnNode) Machine logs indicate a build operation of…
-
Azure Threat Research Matrix
Read more: Azure Threat Research MatrixHi, In this article, I will share with you the Azure Threat Research Matrix. The purpose of the Azure Threat Research Matrix (ATRM) is to conceptualize the known tactics, techniques,…
-
AKS | Image Cleaner
Read more: AKS | Image CleanerHi! In this article, I will show you how you can clean unreferenced images stored at the nodes level. When done manually, this process can be time intensive, which ImageCleaner…
-
Network security groups support for private endpoints
Read more: Network security groups support for private endpointsHi! Network security groups (NSGs) support for private endpoints is now generally available. This feature enhancement provides you with the ability to enable advanced security controls on traffic destined to a…
-
Two news alerts for Microsoft Defender for KeyVault (AKV)
Read more: Two news alerts for Microsoft Defender for KeyVault (AKV)Hi! In this article, I will share with you two news alerts released in June 2022 for Microsoft Defender for KeyVault. Alert (alert type) Description MITRE tactics Severity Unusual access…
-
AKS | Start and Stop Node Pool
Read more: AKS | Start and Stop Node PoolHi! Your AKS workloads may not need to run continuously, for example a development cluster that has node pools running specific workloads. To optimize your costs, you can completely turn…