Configure On-Premises Servers With Ansible Through Azure Devops

In this post, I will walk through how you can set up an Azure DevOps pipeline agent, with Ansible, and use it for configuring and provisioning resources on your on-premises servers. In the example for this post, I will be setting up a Linux pipeline agent, installing Ansible with Kerberos authentication, and at the end creating a DNS record on a Domain Controller.   Prerequisites To follow along with this lab you will need:

Provision Multiple Users in Azure Ad With Infrastructure as Code, Using Terraform

A couple of days ago I wrote a post on how you can get started with Terraform, and how you can use it to provision users and groups in your Azure Active Directory Tenant. In that post, I showed how you can hardcode a user’s information inside the Terraform file. Although you could create a terraform module and keep the user’s information in that module, it might be easier to use something like a CSV file.

Spinning Up Lab Vms With Vagrant on Hyper-V and Provisioning Them With Ansible

I have lately been playing around with deploying virtual machines for lab purposes and for that I have been using Hyper-V on my local Windows PC. For configuring the VMs both for Linux and for Windows I have been using Ansible. But I quickly got tired of manually spinning up Virtual Machines, or copying from templates, which made me start looking into Vagrant. Vagrant is a framework that is used for automating deployments of virtual machines on different providers such as VMware, Hyper-V, VirtualBox, and many others.

Managing Azure Ad Users and Groups With Infrastructure as Code Using Terraform

In this post, I will explain how you can install and get started with Terraform. I will then show how you can use Terraform for building your users and groups in Azure Active Directory with Infrastructure as Code. Building your entire directory of users with Infrastructure as Code will be useful for making easy onboardings of new users, and a very verbose and descriptive layout of all your users. You can also utilize Terraform modules for making different standards of users if you have a specific user type with specific group permissions.

Using Powershell to Investigate Azure Ad User Risks

In this post, I will explain how you can use the PowerShell SDK for Microsoft Graph to investigate Risky Users in your Azure Active Directory. I will also show you how to use PowerShell to connect directly to the Microsoft Graph and query the data from there. Being able to query for riskDetections, risky users, and sign-ins, allows you to automate alerts or actions whenever a user gets flagged in your risk policy.

Creating a Powershell Automation Scheduling App With Azure and Microsoft Powerapps

For me, one of the most annoying kinds of tickets you can receive at a helpdesk is a request for temporary permissions. You receive a ticket stating that “this user” should be granted access to this SharePoint site, and the permission should be removed after 1 week. Or “this old mailbox” should be restored, and “that user”, should only have access for the next couple of days. The Tickets are easy enough to complete, but the annoying part is to schedule that you need to perform a task two times, one for granting the permissions, then wait.