Kaido Jarvemets - Logo

Mastering Infrastructure Management

Insights and Strategies for Success


Security Posts

Secure Azure Arc Tier-0 assets by disabling Run Command....
Starting from 30 June 2023, older versions of Microsoft Monitoring Agents (MMAs) will no longer communicate with Azure Log Analytics due to a certificate shift. Users are urged to check their MMA versions and update if necessary to ensure uninterrupted...
Discover key insights on Entra ID Restricted Management Administrative Units in my new 30-minute video tutorial. From understanding Administrative Units to practical demonstrations and auditing with Kusto Query Language, this exclusive content is designed to enhance your knowledge and skills....
Learn how to audit the members of Entra ID Restricted Management Administrative Units using PowerShell. This post provides an overview of a script designed to retrieve both active and eligible members of a specified Administrative Unit, offering a starting point...
Explore the powerful features of Entra ID Restricted Management Administrative Units with Kusto Query Language (KQL). This blog post provides a comprehensive guide to using KQL for interacting with these units, offering examples for listing events, managing members, and handling...
Explore the power of automation with Entra ID Administrative Units using PowerShell. This guide dives into the creation, management, and automation of both standard and Restricted Management Administrative Units. Learn how to connect to Microsoft Graph, create and remove units,...
Explore the use of Restricted Management Administrative Units in Entra ID for enhanced security and control. Learn how to create, manage, and leverage them effectively...
Strengthen incident response with solid infrastructure design. Avoid random purchases and build a robust strategy. Gain insights from Microsoft Azure's perspective. Optimize your cybersecurity posture....
Learn how to monitor Windows Local Administrator Password Solution (LAPS) events with Microsoft Sentinel. This guide provides a step-by-step process to create Data Collection Rules (DCRs) and configure Sentinel to gather crucial security information....

A personal view of the field can provide you with an outsider’s insight, or an insider’s, depending on your current position. Keep checking to see if I have any new blog posts and products to share.

I aim to update this blog consistently and listen to what my readers wish for me to discuss. Here’s to us moving forward together.