Introducing Microsoft 365

What is Microsoft 365? – at Microsoft Inspire premier partner event in Washington, D.C. last week CEO Satya Nadella unveiled Microsoft 365, which brings together Office 365, Windows 10 and Enterprise Mobility + Security, delivering a complete, intelligent and secure solution to empower employees.

To address the commercial needs from the largest enterprise to the smallest business, Microsoft are introducing Microsoft 365 Enterprise and Microsoft 365 Business. Both are available for purchase on August 1, 2017.

Microsoft 365 Business is designed for small- to medium-sized businesses with up to 300 users and integrates Office 365 Business Premium with tailored security and management features from Windows 10 and Enterprise Mobility + Security. It offers services to empower employees, safeguard the business and simplify IT management.

Microsoft 365 Enterprise is designed for large organisations and integrates Office 365 Enterprise, Windows 10 Enterprise and Enterprise Mobility + Security to empower employees to be creative and work together, securely.

Read more; https://www.microsoft.com/en-us/microsoft-365/default.aspx or please feel free to contact us about your Microsoft needs, or pop in to say hello! 

Send us mail

Speed Matters Workshop: Quickly Migrate to Azure

Secure your place at our workshop here.

Moving to the Cloud can often be a complex and time-consuming process. That’s why CoreAzure have partnered with Velostrata to make the transition to Cloud as simple and as quick as possible. Unlike replication-based approaches, Velostrata has an agentless platform that moves applications to the Cloud in just a matter of minutes.

Our solution enables accelerated Cloud migration and workload mobility with speed, scale, simplicity, and perhaps most importantly, safety. The software is easy to deploy and manage, and can significantly reduce the risks associated with migration.        

Are you interested in finding out more about how you can migrate workloads to Azure in minutes not days? Join CoreAzure, with guest speakers from CoreAzure and Velostrata on the 1st August for an afternoon workshop and discover how we can simplify and accelerate the process of migrating to Azure. The session will also feature a live demo on how to use our solution to migrate workloads to Azure in just a matter of minutes.

This is your opportunity to share and discuss, with the Cloud specialists, the pros and cons, and any concerns that you may have about migrating to Azure. The objective is to leave you with an understanding of how you can use Azure Virtual Machines for a wide range of computing solutions and realise the benefits of Cloud computing.

Agenda:

    • 12:30-1:30pm – Welcome & Lunch
    • 1:30-2:00pm – Introduction to CoreAzure & Velostrata
    • 2:00-2:45pm – Challenges in migrating to the Cloud
    • 2:45-3:00pm – Break
    • 3:00-4:00pm – Live Demonstrations
    • 4:00-4:30pm – Q&A with CoreAzure & Velostrata
    • 4:30-5:00pm – Wrap-up & Close
    • 5:00pm-onwards – Drinks

 Key Information:

  • Date: Tuesday 1st August 2017
  • Location: London
  • Time: 1:30pm-5pm. Drinks and networking session from 5pm onwards. Lunch on arrival and refreshments throughout the session.             

Interested in attending? Register here today!

If you have any questions before the workshop, please get in touch via the details below;

Charlie La Foret | Pre-Sales Consultant

Charlie.laforet@coreazure.com

07557372803

Highly Available Cross-Premises and VNet-to-VNet Connectivity

A couple of days ago, Microsoft announced that New Azure VPN Gateways is now 6x faster which is fantastic news.

It gets even better when you start digging a little deeper and understand not only have they becomes faster but you can now create an Azure VPN gateway in an active-active configuration, where both instances of the gateway VMs will establish S2S VPN tunnels to your on-premises VPN device, as shown the following diagram;

Taking this to the next step, the most reliable option is then combine the active-active gateways on both your network and Azure, as shown in the diagram below;

Here you create and setup the Azure VPN gateway in an active-active configuration, and create two local network gateways and two connections for your two on-premises VPN devices. The result is a full mesh connectivity of 4 IPsec tunnels between your Azure virtual network and your on-premises network.

The same active-active configuration can also apply to Azure VNet-to-VNet connections. You can create active-active VPN gateways for both virtual networks, and connect them together to form the same full mesh connectivity of 4 tunnels between the two VNets, as shown in the diagram below:

This ensures there are always a pair of tunnels between the two virtual networks for any planned maintenance events, providing even better availability.

For those who are interested in taking this to the next level and  considering Highly Available Cross-Premises Connections then please do look at the Microsoft article ‘Configure active-active S2S VPN connections with Azure VPN Gateways’ and if you would like help and assistance then please do contact us.

Send us mail

Microsoft releases Windows 10 S

Microsoft has released a new version of its operating system called Windows 10 S, which is primarily aimed at teachers and students.

Windows 10 S is a fully functioning version of Windows, but only runs apps available in the Windows Store featuring thousands of available applications including free, paid and trial versions of software. This will soon include the full Microsoft Office suite and Spotify, while Slack, Evernote, Netflix, Facebook, Adobe Photoshop Elements and many others are already available.

The operating system uses Microsoft Edge as its default browser, which Microsoft claims is more secure than Chrome and Firefox. It also includes features such as the new Tab Preview Bar, designed to make it easier for students to organise research and manage school projects. With full support for Windows Ink in Microsoft Edge, students can make notes directly on a web page and share them with classmates.

Device partners including Acer, ASUS, Dell, Fujitsu, HP, Samsung and Toshiba are expected to bring out a range of Windows 10 S devices in the coming months. Microsoft will soon release the new Surface Laptop too, which will run the new operating system by default.

How does it compare to Google’s Chromebooks?

Windows 10 S is Microsoft’s answer to the success of Google’s Chromebooks in the education sector. Chromebooks are affordable laptops that run Google’s Chrome OS, which is an operating system built around the search company’s Chrome browser and is limited to web apps and some Android apps.

Windows 10 S, while aimed at the same market, is a fully-fledged version of Windows that is limited to apps from the Windows Store, but can accept and use any peripherals or other devices that any other Windows computer can. That will make Windows 10 S much more capable than Chrome OS.

If you would like more information in relation to Windows 10 S or how Microsoft Store for Business and Microsoft Store for Education gives IT decision makers and administrators in businesses or schools a flexible way to find, acquire, manage, and distribute free and paid apps in select markets to Windows 10 devices in volume, then please contact us.

Send us mail

 

One-click disaster recovery of applications using Azure Site Recovery

Disaster recovery is not only about replicating your virtual machines but also about the end to end application recovery that is tested multiple times, error free, and stress free when disaster strikes.

Automate most recovery tasks to reduce RTO

Recovering large applications can be a complex task. It can be difficult to remember the exact customisation steps post failover.  Sometimes, it is not you, but someone else who is unaware of the application intricacies, who needs to trigger the failover. Remembering too many manual steps in times in a disaster recovery scenario is difficult and error prone.

A recovery plan helps gives you a way to automate the required actions you need to take at every step, by using Microsoft Azure Automation runbooks. With runbooks, you can automate common recovery tasks like the examples given below. For those tasks that cannot be automated, recovery plans also provide you the ability to insert manual actions.

  • Tasks on the Azure virtual machine post failover – these are required typically so that you can connect to the virtual machine, for example:
    • Create a public IP on the virtual machine post failover
    • Assign an NSG to the failed over virtual machine’s NIC
    • Add a load balancer to an availability set
  • Tasks inside the virtual machine post failover – these reconfigure the application so that it continues to work correctly in the new environment, for example:
    • Modify the database connection string inside the virtual machine
    • Change web server configuration/rules

For many common tasks, you can use a single runbook and pass parameters to it for each recovery plan so that one runbook can serve all your applications.

Real-world example – WordPress disaster recovery solution

Watch a quick video of a two-tier WordPress application failover to Microsoft Azure and see the recovery plan with automation scripts, and its test failover in action using Azure Site Recovery.

  • The WordPress deployment consists of one MySQL virtual machine and one frontend virtual machine with Apache web server, listening on port 80.
  • WordPress deployed on the Apache web server is configured to communicate with MySQL via the IP address 10.150.1.40.
  • Upon test failover, the WordPress configuration needs to be changed to communicate with MySQL on the failover IP address 10.1.6.4. To ensure that MySQL acquires the same IP address every time on failover, we will configure the virtual machine properties to have a preferred IP address set to 10.1.6.4.

The following video has been created by Microsoft – Channel 9.

When disaster recovery needs to be evoked, you need to ensure that you are able to successfully recover the those applications in a timely manner.  Azure Site Recovery provides  a platform to enable not just the  tier-1 applications to have a business continuity plan, but offers a compelling solution that empowers an orginisation to set up a working end to end disaster recovery plan for 100% of your organisation’s IT applications.

You can use the powerful replication capabilities of Azure Site Recovery for 31 days at no charge for every new physical server or virtual machine that you replicate, whether it is running on VMware or Hyper-V.  For more information,  please review the following URL additional product information  and if you would like to learn more about Azure Site Recovery and how it can help your business, please contact using the form below.

Send us mail

 

CoreAzure and Vuzion announce CSP partnership

CoreAzure are delighted to announce a new partnership with Vuzion to become a tier-two Cloud Solution Provider (CSP). The partnership will enhance our capability to offer Microsoft solutions and services to our customers in the public sector, including discounted pricing, and enhanced managed service capabilities.

Microsoft created CSP indirect partners with the aim of strengthening the partner customer relationship, and with a specific objective of making it easier for customers to purchase the solutions and services they need through enabling them to build a long-lasting relationship with a partner they can trust.

CSP partners commit to providing a high-quality service, to bring their own value and services to final solutions, and provide efficient and accurate billing along with expert customer support.

Charlie La Foret, Pre-Sales Consultant at CoreAzure, says; “We are looking forward to passing on the benefits of becoming a CSP to our existing and prospective public and private sector clients, in particular helping them to realise the full potential of the Azure platform.

Julian Dyer, Vuzion CTO, says “CoreAzure has an excellent reputation as an established provider of Microsoft Cloud services. The partnership with Vuzion will help strengthen our respective services and bring value to Microsoft customers.

“For Vuzion, CoreAzure’s skills and expertise represent a valuable addition to our partner ecosystem, and we’re very pleased to welcome them on board.”

About CoreAzure:

CoreAzure are leaders in the Microsoft technology stack, specialising in Microsoft Azure, with an ability to maximise our client’s investment in Microsoft technology whilst supporting their vision to adopt cloud. We believe that technology needs to align with business vision, and aim to be the partner that always goes that extra mile. Our customers see us as the “go-to experts” when it comes to Microsoft technology, and time and again we prove to them that our knowledge, skills and experience are second to none.

About Vuzion:

Vuzion is an innovative cloud aggregator born from Cobweb, the number one independent cloud hosting provider in Europe that has been liberating technology since 1996. We strive to deliver the best hand picked cloud solutions through our one-of-a-kind partner ecosystem and reach our mission, to future proof business.

For more information, please contact:

Charlie La Foret

07557372803

charlie.laforet@coreazure.com

How to address the 14 UK Cloud Security Principles – Using Microsoft Azure

The National Cyber Security Centre (NCSC) is the UK’s authority on cyber security.

In its publication “Implementing the Cloud Security Principles,”  it lays out the 14 security principles that organisations should use when evaluating cloud services, and which cloud service providers should consider when offering those services to government customers (referred to as “consumers” in the principles).

The 14 principles are aligned with ISO 27001, an auditable, international, information security management standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ISO 27001 formally defines requirements for a complete ISMS to help protect and secure an organisation’s data.

The principles defined by NCSC are:

  1. Data in transit protection. Consumer data transiting networks should be adequately protected
    against tampering and eavesdropping via a combination of network protection and encryption.
  2. Asset protection and resilience. Consumer data, and the assets that store or process it, should be
    protected against physical tampering, loss, damage, and seizure.
  3. Separation between consumers. Separation should exist between different consumers of the
    service to prevent one malicious or compromised consumer from affecting the service or data of
    another.
  4. Governance framework. The service provider should have a security governance framework that
    coordinates and directs their overall approach to the management of the service and information
    within it.
  5. Operational security. The service provider should have processes and procedures in place to
    ensure the operational security of the service.
  6. Personnel security. Service provider staff should be subject to personnel security screening and
    security education appropriate for their role.
  7. Secure development. Services should be designed and developed to identify and mitigate threats
    to their security.
  8. Supply chain security. The service provider should ensure that its supply chain satisfactorily
    supports all of the security principles that the service claims to implement.
  9. Secure consumer management. Consumers should be provided with the tools required to help
    them securely manage their service.
  10. Identity and authentication. Access to all service interfaces (for consumers and providers) should
    be limited to authenticated and authorised individuals.
  11. External interface protection. All external or less trusted interfaces of the service should be
    identified and have appropriate protections to defend against attacks through them.
  12. Secure service administration. The methods used by the service provider’s administrators to
    manage the operational service should be designed to mitigate any risk of exploitation that could
    undermine the security of the service.
  13. Audit information provision to consumers. Consumers should be provided with the audit records
    they need to monitor access to their service and the data held within it.
  14. Secure use of the service by the consumer. Consumers have certain responsibilities when using a
    cloud service in order for this use to remain secure, and for their data to be adequately protected.

To help find a way through the principles, Microsoft have released a number of Azure Blueprints, enabling the UK public sector to review and understand how solutions built on Azure can implement the 14 individual Cloud Security Principles supporting workloads with information designated as UK OFFICIAL level. The Azure Blueprint outlines how Azure implements security controls designed to satisfy each security principle and assists customers in understanding how they may implement safeguards within their Azure solution to fulfil the requirements of each principle where they hold a responsibility.

As an example, an Azure Virtual Network (VNet) allows full control of security policies and routing within virtual network architectures through deployment and configuration of subnets, network security groups, and user defined routes. Network security groups can be applied to subnets or individual machines, logically separating resources by workload, based on a multi-tier architecture, of for any other purpose.

In the reference architecture below, resources are grouped in separate subnets for the web, business, and data tiers, and subnets for Active Directory resources and management. Network security groups are applied to each subnet to restrict network traffic within the virtual network.

Network security groups can be applied to outgoing communications from subnets and virtual machines. This allows full control over communication between information system components in Azure and external information systems.  Network security group rule processing is implemented as a deny-all, permit-by-exception function. Further, user defined routes can be configured to route both incoming and outgoing communications from specific subnets and virtual machines through a virtual appliance such as a firewall or IDS/IPS, further managing system communications.

The reference architecture above demonstrates how Azure resources can be logically grouped into separate subnets with network security group rulesets applied to ensure that security functions and non-security functions are isolated. In this case, the three web-application tiers are isolated from the Active Directory subnet as well as the management subnet, which may host information system and security management tools and resources.

The reference architecture also implements managed access control points for remote access to the information system.  An Internet-facing load balancer is deployed to distribute incoming Internet traffic to the web application, and the management subnet includes a jumpbox, or bastion host, through which all management-related remote access to the system is controlled. Network security groups restrict traffic within the virtual network ensuring external traffic is only routed to designated public-facing resources.

Network security groups allow full control of communications between Azure resources and external host and systems, as well as between internal subnets and hosts, separating information system components that are designated publicly accessible and those that are not. In addition to the solutions in the reference architecture above, Azure enables deployment of virtual appliances, such as firewall and IDS/IPS solutions which, when used in conjunction with user defined routes, further secure and manage connections between Azure resources and external networks and information systems.

Rulesets for network security groups enable restrictions on specific network ports and protocols, which is a key component of ensuring that information systems are implemented in a manner that provides only essential capabilities.

Whilst this is just one example, there are lots of built-in features that can help organisations meet their security control compliance requirements to take full advantage of the security features offered by Azure.   The 14 Cloud Security Controls for the UK cloud whitepaper provides insight into how Azure services align with the fourteen cloud security principles set forth in the NCSC  publication Implementing the Cloud Security Principles.

If you would like to discuss how CoreAzure can help you take full advantage of the security features offered by Azure , then please get in touch with us using the form below.

Send us mail

 

 

How Microsoft Office 365 can help you with The General Data Protection Regulation (GDPR)

In May 2018, the General Data Protection Regulation (GDPR), will impose new rules on companies, government agencies, non-profits, and other organisations that offer goods and services to people in the European Union, or that collect and analyse data tied to EU residents. The GDPR applies no matter where you are located.

Whilst the Information Commissioner’s Office (ICO), the UK’s data protection regulator, has already taken noticeable steps in assisting businesses to prepare for the GDPR, by publishing its Guidance Roadmap.  We thought it would be useful to highlight how some of Microsoft products and services available today that can help you meet the GDPR requirements.

One essential step to meeting the GDPR obligations is discovering and controlling what personal data you hold and where it resides. There are a number of Office 365 solutions that can help you identify or manage access to personal data.

Data Loss Prevention (DLP) in Office and Office 365 can identify over 80 common sensitive data types including financial, medical, and personally identifiable information. In addition, DLP allows organisations to configure actions to be taken upon identification to protect sensitive information and prevent its accidental disclosure.

Advanced Data Governance uses intelligence and machine-assisted insights to help you find, classify, set policies on, and take action to manage the lifecycle of the data that is most important to your organisation.

Office 365 eDiscovery search can be used to find text and metadata in content across your Office 365 assets—SharePoint Online, OneDrive for Business, Skype for Business Online, and Exchange Online. In addition, powered by machine learning technologies, Office 365 Advanced eDiscovery can help you identify documents that are relevant to a particular subject (for example, a compliance investigation) quickly and with better precision than traditional keyword searches or manual reviews of vast quantities of documents.

Customer Lockbox for Office 365 can help you meet compliance obligations for explicit data access authorisation during service operations. When a Microsoft service engineer needs access to your data, access control is extended to you so that you can grant final approval for access. Actions taken are logged and accessible to you so that they can be audited.

Another core requirement of the GDPR is protecting personal data against security threats. Office 365 provide features that safeguard data and identify when a data breach occurs;

Advanced Threat Protection in Exchange Online Protection helps protect your email against new, sophisticated malware attacks in real time. It also allows you to create policies that help prevent your users from accessing malicious attachments or malicious websites linked through email.

Threat Intelligence helps you proactively uncover and protect against advanced threats in Office 365. Deep insights into threats—provided by Microsoft’s global presence, the Intelligent Security Graph, and input from cyber threat hunters—help you quickly and effectively enable alerts, dynamic policies, and security solutions.

Advanced Security Management enables you to identify high-risk and abnormal usage, alerting you to potential breaches. In addition, it allows you to set up activity policies to track and respond to high risk actions.

• Finally, Office 365 audit logs allow you to monitor and track user and administrator activities across workloads in Office 365, which help with early detection and investigation of security and compliance issues.

If you would like to discuss how Microsoft Office 365 or Azure resources can help you meet your GDPR requirements, please contact us using the form below.

Send us mail

Snapshot VMs in Azure Resource Manager

One of our most-popular blog posts (drawing almost a quarter of all visitors to our site) has been Mark Briggs’ excellent Snapshot VMs in Azure guide from August 2014. Although much of the content of this article is still relevant for virtual machines created using the classic Azure portal, there have been a number of major changes to the Microsoft Azure platform in the interim, including the introduction of the Azure Resource Manager (ARM) deployment model, along with significant changes to the Azure PowerShell modules which may result in unexpected behaviour and warnings about deprecated features.

I thought it would be useful to provide an updated guide for creating snapshots from virtual machines which have been created in the new Azure portal (https://portal.azure.com) using the Azure Resource Manager deployment model.


Warning

The following guide has been provided purely for informational purposes and should be thoroughly tested on non-critical systems. CoreAzure cannot be held responsible for any consequences arising from the use of this information.

Step 1: Install Azure PowerShell

If you haven’t already installed the latest Azure modules for PowerShell, you can do so using the following steps:

  1. Open an administrative Command Prompt. The easiest way is to right-click on the Start button and select Command Prompt (Admin).
  2. Enter the command powershell and press Return to start a Windows PowerShell session.
  3. Enter the command Install-Module AzureRM and press Return.
  4. If you are prompted to install the NuGet provider, type and press Return to confirm.
  5. If you receive a warning about an untrusted repository, type and press Return to add PSGallery to the list of trusted repositories.

Step 2: Validate current VM configuration

We now need to take a look at the configuration of the virtual machine we wish to snapshot as the script we will be using to perform the operation needs to know details such as the resource group which contains the VM, its network configuration, storage account and disk configuration as well as the Azure region which hosts the VM.

The easiest way to do this is to login to the new Azure portal (https://portal.azure.com) and open the resource group containing the VM you wish to snapshot. This will provide a list of all resources associated with the virtual machine.

For this demonstration, I have created a test resource group named snapshotrg in the UK South region containing the resources shown in the screenshot below:

Resource Group Properties

Resource Group Properties

As you can see, the resource group contains a virtual machine named snapshotvm connected to a virtual network called snapshotvn via a network interface named snapshotvm156. This network interface has a public IP address assigned named snapshotpip, along with a Network Security Group called snapshotnsg which contains a single rule to allow incoming RDP connections.

The virtual machine is connected to a storage account named snapshotsa which contains a single container named vhds. Inside this container is the virtual machine’s OS disk named snapshotvm20170221112834.vhd.

We can ignore the other storage account (snapshotrgdiag735) listed in the resource group as this has been automatically generated by Azure for boot logging purposes and does not need to be included in any snapshot operations.

Virtual Machine Properties

Virtual Machine Properties

If we look at the properties of the virtual machine itself, we can see that it is a Windows server with a VM size of Standard F1s. The public IP address it has been assigned is 51.140.29.163 which has been given a DNS name of snapshotvm.uksouth.cloudapp.azure.com. We can also make a note of the Subscription Name.

The final piece of information we need to gather is the storage account key used to communicate with the storage account (as our script will be creating snapshots in the same container as the original OS disk). To do this, simply open the properties of the storage account (in my case, snapshotsa) and select the Access keys option. You should now be presented with two access keys, either of which can be copied into our script in Step 3.

Step 3: Populate local variables

We can now use the information gathered in Step 3 to start creating our snapshot script. Launch Windows PowerShell ISE and enter the following into the script pane (replacing the text in angled brackets with the details relevant to your environment). To see the code I used for the snapshotvm virtual machine, click on the Example tab:

Code
$resourceGroupName = "<Insert Resource Group Name Here>"
$location = "<Insert Azure Region Here>"
$vmName = "<Insert VM Name Here>"
$vmSize = "<Insert VM Size Here>" 
$vnetName = "<Insert vNet Name Here>"
$nicName = "<Insert NIC Name Here>" 
$dnsName = "<Insert DNS Name Here>" 
$diskName = "<Insert Disk Name Here (omitting the .vhd extension)>" 
$storageAccount = "<Insert Storage Account Name Here>" 
$storageAccountKey = "<Insert Storage Account Key Here>" 
$subscriptionName = "<Insert Subscription Name Here>" 
$publicIpName = "<Insert Public IP Address Name Here>"
Example
$resourceGroupName = "snapshotrg" 
$location = "UK South" 
$vmName = "snapshotvm" 
$vmSize = "Standard_F1s" 
$vnetName = "snapshotvn" 
$nicName = "snapshotvm156" 
$dnsName = "snapshotvm" 
$diskName = "snapshotvm20170221112834" 
$storageAccount = "snapshotsa" 
$storageAccountKey = "<OBFUSCATED>" 
$subscriptionName = "Pay-As-You-Go" 
$publicIpName = "snapshotpip"

We can concatenate some of the information provided above to give us the full name of the disk blob, target backup disk blob and full path to the VHD which will be stored in the following variables:

$diskBlob = "$diskName.vhd"
$backupDiskBlob = "$diskName-backup.vhd"
$vhdUri = "https://$storageAccount.blob.core.windows.net/vhds/$diskBlob"
$subnetIndex = 0

Step 4: Login to your Azure subscription

We now need to configure our script to login to Microsoft Azure and connect to the right subscription. For maximum security, Microsoft recommend using a service principal and certificate to login to Azure. This is especially true when you have created batch scripts or apps which need to run without prompting for additional credentials (and which you wouldn’t necessarily want to run under your own credentials). However, configuring this method of authentication falls outside the scope of this tutorial, so we will be using Azure AD credentials for simplicity.

To login to Azure and connect to the required subscription, we can use the Login-AzureRmAccount and Set-AzureRMContext commands in conjunction with the $subscriptionName variable we defined earlier:

Add-AzureRmAccount 
Set-AzureRMContext -SubscriptionName $subscriptionName

When these commands are run, a window should automatically appear prompting you to login to Azure. Assuming the correct credentials are provided, the window will disappear and take you back to the active PowerShell session.

Step 5: Create backup disk

To create a snapshot of the disk, we first need to power off the virtual machine using the following command:

Stop-AzureRmVM -ResourceGroupName $resourceGroupName -Name $vmName -Force -Verbose

We can then check to see if a backup has already been created using the following commands:

$ctx = New-AzureStorageContext -StorageAccountName $storageAccount -StorageAccountKey $storageAccountKey
$blobCount = Get-AzureStorageBlob -Container vhds -Context $ctx | where { $_.Name -eq $backupDiskBlob } | Measure | % { $_.Count }

If no backup disk is currently found in the container, we can proceed with creating a copy. Although the copy operation should be relatively quick (as the target file is located in the same storage container), I’ve included a while loop to report the copy status every 10 seconds. This might prove useful if you want the snapshot to be copied to a different region or on a local file server:

if ($blobCount -eq 0)
{
$copy = Start-AzureStorageBlobCopy -SrcBlob $diskBlob -SrcContainer "vhds" -DestBlob $backupDiskBlob -DestContainer "vhds" -Context $ctx -Verbose
$status = $copy | Get-AzureStorageBlobCopyState
$status
While($status.Status -eq "Pending"){
$status = $copy | Get-AzureStorageBlobCopyState
Start-Sleep 10
$status
}
}

We can now check the vhd storage container in the portal to confirm that the copy has been created:

Original VHD and Backup

Original VHD and Backup

Step 6: Delete original resources

With our snapshot created, we can test the restore process by deleting some of the original resources. The following script should delete the original virtual machine, along with its disk, network interface and public IP address:

Remove-AzureRmVM -ResourceGroupName $resourceGroupName -Name $vmName -Force -Verbose
Remove-AzureStorageBlob -Blob $diskBlob -Container "vhds" -Context $ctx -Verbose
Remove-AzureRmNetworkInterface -Name $nicName -ResourceGroupName $resourceGroupName -Force -Verbose
Remove-AzureRmPublicIpAddress -Name $publicIpName -ResourceGroupName $resourceGroupName -Force -Verbose

To validate that the resources have been deleted, log back into the Azure portal and open the properties of your resource group. The only resources remaining should be the Network Security Group, Virtual Network and storage accounts:

Resource Group After Deletion

Resource Group After Deletion

Step 7: Recreate original disk

We still have the name of the original disk recorded in our $diskBlob variable, so we can easily recreate this disk by creating a copy of our backup disk using this name. Again, I’ve included a 10-second status check loop in case the copy operation takes longer than expected:

$copy = Start-AzureStorageBlobCopy -SrcBlob $backupDiskBlob -SrcContainer "vhds" -DestBlob $diskBlob -DestContainer "vhds" -Context $ctx -Verbose
$status = $copy | Get-AzureStorageBlobCopyState 
$status 
While($status.Status -eq "Pending"){
  $status = $copy | Get-AzureStorageBlobCopyState 
  Start-Sleep 10
  $status
}

Step 8: Recreate resources

With the original disk now back in place, we can proceed with recreating the virtual machine and its associated network resources:

$vnet = Get-AzureRmVirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName
$pip = New-AzureRmPublicIpAddress -Name $publicIpName -ResourceGroupName $resourceGroupName -DomainNameLabel $dnsName -Location $location -AllocationMethod Dynamic -Verbose
$nic = New-AzureRmNetworkInterface -Name $nicName -ResourceGroupName $resourceGroupName -Location $location -SubnetId $vnet.Subnets[$subnetIndex].Id -PublicIpAddressId $pip.Id -Verbose
$vm = New-AzureRmVMConfig -VMName $vmName -VMSize $vmSize
$vm = Add-AzureRmVMNetworkInterface -VM $vm -Id $nic.Id
$vm = Set-AzureRmVMOSDisk -VM $vm -Name $diskName -VhdUri $vhdUri -CreateOption attach -Windows

Step 9: Examine the result

We can now repeat the checks we carried out in Step 2 to see how our environment has changed. If we open the properties of the snapshotrg resource group, we can see that the snapshotvm machine and the public IP address are now present and correct. However, it now has a new network interface named snapshotvm156:

Resource Group After Restore

Resource Group After Restore

If we look at the properties of the public IP address snapshotpip, we can see that a new public IP address of 51.140.27.233 has been assigned. However, it has retained the correct DNS name (so anything which communicates with the server by DNS will still operate correctly). If we didn’t want the public IP address of the server to change, we could have left the old public IP address undeleted (and reassigned it after the new machine was created):

Public IP Address After Restore

Public IP Address After Restore

If we look at the properties of the virtual machine itself, we can see that the new virtual machine has been created with the correct VM size, location and subscription name:

Virtual Machine Properties After Restore

Virtual Machine Properties After Restore

Finally, looking at the disk configuration of the new virtual machine confirms that it is using the original disk name (although the backup file is still available in the vhds container should you need to restore the snapshot again in future):

Disk Configuration After Restore

Disk Configuration After Restore

I hope this guide proved useful. You can download the full PowerShell script using the button below:

Please do not hesitate to contact me using the form below if you have any queries.

Send us mail

3 + 5 = ?

Preview the new enhancements to Azure Security Centre

The unprecedented scale and sophistication of modern cyber threats, combined with the rapidly disappearing IT perimeter, means that while preventing an attack from becoming a breach is ideal, it is no longer realistic. 

While the cloud may have initially raised some security concerns among enterprises, Microsoft is changing those dynamics by applying prescriptive analytics to application and network data, learning the behaviour of a machine or a group of machines, and combining these insights with broad cloud reputation, Azure Security Centre empowers customers to realise the benefits of these controls without introducing any management overhead.

With this collective power of millions of cloud customers, Microsoft can help each customer more effectively defend against the increasing volume and sophistication of attacks. Azure Security Centre has released a number of new capabilities that leverage this collective intelligence to not only detect threats, but also do a better job of preventing them.

Microsoft security research and data science teams are constantly monitoring the threat landscape and adding new or enhancing current detection algorithms. Azure Security Centre customers benefit from these innovations as algorithms are continuously released, validated, and tuned without the need to worry about keeping signatures up to date.

Here are some of the most recent updates:    

  • Harnessing the Power of Machine Learning – Azure Security Center has access to a vast amount of data about cloud network activity, which can be used to detect threats targeting your Azure deployments. For example:
  • Brute Force Detections – Machine learning is used to create a historical pattern of remote access attempts, which allows it to detect brute force attacks against SSH, RDP, and SQL ports. In the coming weeks, these capabilities will be expanded to also monitor for network brute force attempts targeting many applications and protocols, such as FTP, Telnet, SMTP, POP3, SQUID Proxy, MongoDB, Elastic Search, and VNC.
  • Outbound DDoS and Botnet Detection – A common objective of attacks targeting cloud resources is to use the compute power of these resources to execute other attacks. New detection algorithms are generally available in Azure Security Center, which clusters virtual machines together according to network traffic patterns and uses supervised classification techniques to determine if they are taking part in a DDoS attack. Also, in private preview are new analytics that detect if a virtual machine is part of a botnet. It works by joining network data (IPFIX) with passive DNS information to obtain a list of domains accessed by the VM and using them to detect malicious access patterns.
  • New Behavioural Analytics Servers and VMs – Once a server or virtual machine is compromised, attackers employ a wide variety of techniques to execute malicious code on that system while avoiding detection, ensuring persistence, and obviating security controls. Additional behavioural analytics are now generally available in Azure Security Center to help identify suspicious activity, such as process persistency in the registry, processes masquerading as system processes, and attempts to evade application whitelisting. In addition, new analytics have been released to public preview that are designed specifically for Windows Server 2016, for example activity related to SAM and admin account enumeration. Over the next few weeks, many of the behavioural analytics available for Windows VMs will be available for Linux VMs as well. Operations Management Suite Security users will also benefit from these new detections for non-Azure servers and VMs.
  • Azure SQL Database Threat Detection – Threat Detection for Azure SQL Database, which identifies anomalous database activities indicating unusual and potentially harmful attempts to access or exploit databases, announced upcoming general availability in April 2017. You can view alerts from SQL Database Threat Detection in Azure Security Center, along with additional details and actions for investigating and preventing similar threats in the future.

To find out more and take advantage of these and other advanced detection capabilities, or if you would like to discuss your IT Security/ Cybersecurity requirements with one of CoreAzure National Cyber Security Centre (NCSC) Certified Professionals, then please contact with us.

The NCSC Certified Professional provides an independent assessment and verification process, based on the government’s approved standard of competence for cyber security professionals.

Send us mail