Time
4 hours 36 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:02
Let's look at the actual tools that can help you with your network protection.
00:08
We've discussed the Laird's approach to security at the beginning of the model.
00:13
Protecting the perimeter of your network is an essential part of this approach.
00:18
You can use actual security tent of to identify the resources that are publicly exposed but are not protected by a firewall.
00:26
Ah, firewall is a device or service that inspects the network traffic and grants access based on the originating I P address, network protocol and pork.
00:37
You can create fire old rules that specify the I P Address or I be ranges, protocols and ports and the fire. Whoa ensures that only a lot requests are forwarded to the target. Three sources.
00:51
I shall provide several firewall options for you to protect your network from external attacks.
00:57
Actual firewall is a fully managed service that protects resource is in your virtual network.
01:02
It has a building high of our ability, and it can scale on demand.
01:07
Actual fire. Whoa is a layer three firewall and can protect you not only from http HDP attacks, but also
01:17
other protocol attacks like sshh, remote desktop protocol, file transfer protocol and so on.
01:25
We've discussed as your application gateway in the past.
01:29
It has a building Web application firewall that can protect your weapon work walls from common attacks like cross site scripting and sequel injection.
01:38
Actual marketplace has offers for third party Network Virtue appliances that are similar to hardware appliances. Enough our advanced configuration for applications and solutions that require grand work
01:51
configuration.
01:53
Any resource exposed to the Internet is pronto distributed. The now off service attacks the Attackers go is to overwhelm the end points by sending so many requests that the resource becomes responsive.
02:07
Actual DDOS protection service can be used to provide defense against the U. S. Attacks.
02:14
Actually, did us monitors the traffic at the network perimeter, and if an attack is detected, you will be notified using azure monitor metrics.
02:23
The service comes with two tiers basic that is automatically enabled us part of National Platform. It uses the same algorithms that provide protection for all other Microsoft Service's
02:35
and standard that provides additional capabilities that are tune based on the traffic and resource is in your actual virtual network.
02:43
Actually, did us uses machine learning to learn the communication? Parton's between the resource is deporting the Venus and can mitigate various types of attacks, like biometric ones, where the attacker tries to say I'm a light legit Traffic
02:58
protocol attacks where protocol weaknesses are exploited or resource layer attacks where the application traffic is disrupted.
03:07
Protection that the perimeter is just one of the layers of security that you can implement.
03:13
You also need to think of protection inside your network and prevent the lateral movement of an attacker if one of your existing defences fails,
03:22
as we discussed previously, network security groups are critical to restricting the communication between your internal resource is network security groups are resource based firewalls that allow you to create inbound and now about rules based on I P addresses, protocols and ports.
03:38
It is recommended to deny all communication between system that is not essential for the work of your application.
03:46
You can remove the public access to your at your service is by restricting access to the service endpoints, practically limiting the traffic to the minute. Only
03:55
communication with your on premise work Walls can become figured by other private virtual private network that communicates with the VP and device on the premise on premises or via dedicated private connection using express route that allows you
04:12
you also have private connection to other. Microsoft service is like Office 3 65 and Dynamics 3 65
04:17
This limits the exposure to Darfur basis as well.
04:21
In the next video, we'll see how you can use an actual advanced threat protection to detect threats on your quality infrastructure.

Up Next

AZ-900 Microsoft Azure Fundamentals

In this online Microsoft Azure Fundamentals training course, students will learn basic cloud computing concepts and how these concepts are applied specifically to Microsoft Azure. Upon completion, students will be prepared to take the AZ-900 certification exam.

Instructed By

Instructor Profile Image
Toddy Mladenov
Instructor