Azure customers can centrally monitor backup entities, perform agentless backups, secure data against cyber threats and more with the latest updates for Microsoft Azure Backup Server (MABS).
Latest update to MABS ensures customers are able to centrally monitor all backup entities, perform agentless backups, secure data against cyber threats like ransomware, machine compromise, and recover from them, writes Azure team.
Moving step further, the Backup Server now also provides security based mechanisms to safeguard all the operations that impact availability of cloud data. Available already available in multiple regions, it is now available in new regions as well including Canada, UK, and West US2.
New to MABS, "is a cloud-first solution protects data and workloads across heterogeneous IT environments of enterprises."
Key features of MABS include:
- Central monitoring on-premises assets backed up in Azure Backup Server from portal. Recovery Services vault now provides a centralized view of backup management servers, protected servers, backup items, and their associations. This gives a simple experience to search for backup items, identify Azure Backup Server they are associated to, view disk utilization, and other details related to these entities.
- Security features available as part of latest update are built on three principles – Prevention, Alerting, and Recovery – to enable organizations increase preparedness against attacks and equip them with a robust backup solution.
- VMware support capability provides agentless backups, seamless discovery, and auto-protection features.
Customers interested can download it for free with Azure Backup without requiring of System Center License or SQL license for server DB.
Microsoft has also posted two videos explaining how to get started by enabling Security features and how to leverage them in Azure Backup Server, as wel as a go through 4 simple steps to protect VMware VMs using Azure Backup Server.
Watch all othervideos embedded below:
1. Enable a secure SSL communication between Azure Backup Server and VMware server
2. Add a new user with certain minimum privileges
3. Add VMware Server to Azure Backup Server
4. Protect VMware VMs with Azure Backup Server
For more information on Azure Backup Server, wath these videos HERE.
For developers, Microsoft recently introduced several new features in Azure Active Directory B2C including, a web app that updates page as consumers interact with the app called "Single-Page App" (SPA), also loads a single HTML page.
"Azure Active Directory B2C, a cloud identity service for app developers."
Other new elements include "usage reporting APIs," and "friction-free consumer sign-up".
Usage reporting APIs brings the access to rich consumer activity reports on Azure AD B2C tenants via REST-based Azure AD reporting APIs. "You can easily pipe the data from these reports into business intelligence and analytics tools, such as Microsoft's Power BI, for detailed analyses," added Azure team.
With the current release, 4 activity reports are available:
- tenantUserCount: Total number of consumers in your Azure AD B2C tenant (per day for the last 30 days). You can also get a breakdown by the number of local accounts (password-based accounts) and social accounts (Facebook, Google, etc.).
- b2cAuthenticationCount: Total number of successful authentications (sign-up, sign-in, etc.) within a specified period.
- b2cAuthenticationCountSummary: Daily count on successful authentications for the last 30 days.
- b2cMfaRequestCountSummary: Daily count of multi-factor authentications for the last 30 days.
- Get started using the steps outlined in this article.
Friction-free consumer sign-up experience makes sense for certain app types. The team said, you can do this on your "Sign-up policies" or "Sign-up or sign-in policies".
While in the cloud news, take a look at this video, highlighting a new product feature from the Hybrid Cloud Platform, "Shielded Virtual Machines" in Windows Server 2016.
You can't put virtual machines (VMs) under lock and key. "Network admins, backup admins, server admins, storage admins, and potentially others have access to your virtual machines. Any one of them could inject malicious code into the virtual machine or upload a VM onto a USB and take it home for inspection, and you'd be none the wiser."
Take a look: