top of page
Search


Multi-tier web application built for HA/DR
This example scenario applies to any industry that needs to deploy resilient multitier applications built for high availability and...

ALIF Consulting
Mar 22, 20223 min read
Â
Â
Â


Run a highly available SharePoint Server 2016 farm in Azure
This reference architecture shows proven practices for deploying a highly available SharePoint Server 2016 farm on Azure, using MinRole...

ALIF Consulting
Mar 22, 20225 min read
Â
Â
Â


SQL Server 2008 R2 failover cluster in Azure
Many businesses rely on SQL Server 2008 R2 failover clusters to manage their data. However, support for SQL Server 2008 R2 and for...

ALIF Consulting
Mar 22, 20223 min read
Â
Â
Â


Using Azure file shares in a hybrid environment
This architecture shows how to include Azure file shares in your hybrid environment. Azure file shares are used as serverless file...

ALIF Consulting
Mar 22, 20225 min read
Â
Â
Â


Windows N-tier application on Azure
This reference architecture shows how to deploy virtual machines (VMs) and a virtual network configured for an N-tier application, using...

ALIF Consulting
Mar 21, 20225 min read
Â
Â
Â


Zero-trust network for web applications with Azure Firewall and Application Gateway
This guide outlines a strategy for implementing zero-trust security for web apps. This type of security model verifies the...

ALIF Consulting
Mar 21, 20226 min read
Â
Â
Â


Azure SQL Managed Instance
Azure SQL Managed Instance is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine...

ALIF Consulting
Mar 21, 20223 min read
Â
Â
Â


Azure Managed Disk Encryption
Encryption is the process of encoding a message or information in a way that only authorized parties can access it, and those who are not...

ALIF Consulting
Mar 20, 20223 min read
Â
Â
Â


Azure Key Vault
Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to control access to...

ALIF Consulting
Mar 20, 20223 min read
Â
Â
Â


Azure DevTest Labs reference architecture for enterprises
DTL helps developers within teams to efficiently self-manage virtual machines (VMs) and PaaS resources without waiting for approvals,...

ALIF Consulting
Mar 20, 20225 min read
Â
Â
Â


Azure DDoS Protection
Azure DDoS Protection, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS...

ALIF Consulting
Mar 20, 20226 min read
Â
Â
Â


Azure AD B2C
What is CIAM ? In today's digital world, seamless customer experiences are no longer a luxury; they're a necessity. Customers expect to...

ALIF Consulting
Mar 20, 20223 min read
Â
Â
Â


Spam Filter in Office 365
Exchange Online Protection – Office 365 Spam Filter Protection from spam and malware while maintaining access to email during and after...

ALIF Consulting
Mar 13, 20223 min read
Â
Â
Â
![ATP Policy [Safe Links, Safe Attachments]](https://static.wixstatic.com/media/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.png/v1/fill/w_435,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.webp)
![ATP Policy [Safe Links, Safe Attachments]](https://static.wixstatic.com/media/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.png/v1/fill/w_454,h_261,fp_0.50_0.50,q_95,enc_avif,quality_auto/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.webp)
ATP Policy [Safe Links, Safe Attachments]
“ Microsoft Office 365 Advanced Threat Protection (ATP) is a cloud-based email filtering service that helps protect your organization...

ALIF Consulting
Mar 13, 20223 min read
Â
Â
Â


Authentication in Office 365
The purpose of cloud-based authentication is to protect companies from hackers trying to steal confidential information. Cloud...

ALIF Consulting
Mar 13, 20224 min read
Â
Â
Â


What is eDiscovery and Content Search in Office 365
Electronic discovery, or eDiscovery, identifies and delivers electronic information that can be used as evidence in legal cases. You can...

ALIF Consulting
Mar 13, 20224 min read
Â
Â
Â


Identities in Office 365
Identity and authentication management is the most crucial component of any organization. It is important to carefully consider which...

ALIF Consulting
Mar 13, 20224 min read
Â
Â
Â


Types of hold in Office 365
Microsoft 365 offers several ways that your organization can prevent mailbox content from being permanently deleted. This allows your...

ALIF Consulting
Mar 13, 20224 min read
Â
Â
Â


Mail Flow in Office 365
When it comes to emails, emails are the most important aspect of any productivity or business, and they should always be set 24/7. We...

ALIF Consulting
Mar 11, 20223 min read
Â
Â
Â


Difference between a User Mailbox and a Shared Mailbox
The main difference between a user mailbox and a shared mailbox is that the shared mailbox is associated with a disabled user. A shared...

ALIF Consulting
Mar 11, 20223 min read
Â
Â
Â
bottom of page
