by Evan Basalik
December 10, 2019
Evan talks about a recent support case he worked on and how it's easy to blame Azure for everything that goes wrong when moving to the Cloud.
Media file: https://azpodcast.blob.core.windows.net/episodes/Episode307.mp3
Transcript:
Other updates:
Support to assess physical servers is now available in Azure preview, in addition to existing support for VMware and Hyper-V servers. The appliance for physical servers can be installed on an existing Windows server. This feature can be used to assess virtual machines where there is no access to the hypervisor, as well as virtual machines on any cloud. For more details, refer to the documentation
Azure HDInsight now supports the use of service tags to simplify inbound network security group (NSG) rule management. Azure service tags group multiple IP addresses under a single user friendly tag. Administrators need to only create rules by referring to the tags while Microsoft takes the responsibility of keeping the IP addresses up to date. Administrators maintaining Azure HDInsight clusters can now benefit from this manageability improvement.
Now in preview for the East US and UK South regions only, Azure Database for MariaDB, PostgreSQL, MySQL provides support for service health notifications for planned maintenance.
Web Application Firewall—New bot protection rule now in preview
Updated: December 09, 2019
A new bot protection ruleset (Microsoft_BotManagerRuleSet_1.0) is now in preview for Azure Web Application Firewall with Azure Front Door service. Adding to this updated ruleset are three bot categories—good, bad, and unknown. There are multiple bot groups within each category. Bot signatures are managed and dynamically updated by Web Application Firewall service. The default action for bad bot groups is set to Block, for the verified search engine crawlers group it’s set to Allow, and for the unknown bot category it’s set to Log. Customers may overwrite the default action with Allow, Block, Log, or Redirect for any type of bot groups.
For more details, see bot protection overview.
https://azure.microsoft.com/en-us/updates/new-bot-protection-rule-set-in-public-preview-for-web-application-firewall-waf-with-azure-front-door-service/