top of page
Search


Baseline architecture for an Azure Kubernetes Service (AKS) cluster
In this reference architecture, we'll build a baseline infrastructure that deploys an Azure Kubernetes Service (AKS) cluster. This...

ALIF Consulting
Mar 24, 20225 min read
Â
Â
Â


Microsoft Defender for Cloud
Defender for Cloud is a tool C and threat protection. It strengthens the security posture of your cloud resources, and with its...

ALIF Consulting
Mar 22, 20225 min read
Â
Â
Â


Multi-layered protection for Azure virtual machine access
This solution provides a multi-layered approach for protecting virtual machines (VMs) in Azure. Users need to connect to VMs for...

ALIF Consulting
Mar 22, 20224 min read
Â
Â
Â


Multi-tier web application built for HA/DR
This example scenario applies to any industry that needs to deploy resilient multitier applications built for high availability and...

ALIF Consulting
Mar 22, 20223 min read
Â
Â
Â


Virtual Network NAT
Virtual Network NAT is a fully managed and highly resilient Network Address Translation (NAT) service. VNet NAT simplifies outbound...

ALIF Consulting
Mar 22, 202210 min read
Â
Â
Â


SQL Server 2008 R2 failover cluster in Azure
Many businesses rely on SQL Server 2008 R2 failover clusters to manage their data. However, support for SQL Server 2008 R2 and for...

ALIF Consulting
Mar 22, 20223 min read
Â
Â
Â


Using Azure file shares in a hybrid environment
This architecture shows how to include Azure file shares in your hybrid environment. Azure file shares are used as serverless file...

ALIF Consulting
Mar 22, 20225 min read
Â
Â
Â


Windows N-tier application on Azure
This reference architecture shows how to deploy virtual machines (VMs) and a virtual network configured for an N-tier application, using...

ALIF Consulting
Mar 21, 20225 min read
Â
Â
Â


Zero-trust network for web applications with Azure Firewall and Application Gateway
This guide outlines a strategy for implementing zero-trust security for web apps. This type of security model verifies the...

ALIF Consulting
Mar 21, 20226 min read
Â
Â
Â


Azure SQL Managed Instance
Azure SQL Managed Instance is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine...

ALIF Consulting
Mar 21, 20223 min read
Â
Â
Â


Azure Managed Disk Encryption
Encryption is the process of encoding a message or information in a way that only authorized parties can access it, and those who are not...

ALIF Consulting
Mar 20, 20223 min read
Â
Â
Â


Azure Key Vault
Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to control access to...

ALIF Consulting
Mar 20, 20223 min read
Â
Â
Â


Azure DevTest Labs reference architecture for enterprises
DTL helps developers within teams to efficiently self-manage virtual machines (VMs) and PaaS resources without waiting for approvals,...

ALIF Consulting
Mar 20, 20225 min read
Â
Â
Â


Azure DDoS Protection
Azure DDoS Protection, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS...

ALIF Consulting
Mar 20, 20226 min read
Â
Â
Â


Azure AD Connect
Azure AD Connect is an on-premises Microsoft application that's designed to meet and accomplish your hybrid identity goals. If you're...

ALIF Consulting
Mar 20, 20222 min read
Â
Â
Â


Azure AD B2C
What is CIAM ? In today's digital world, seamless customer experiences are no longer a luxury; they're a necessity. Customers expect to...

ALIF Consulting
Mar 20, 20223 min read
Â
Â
Â


Spam Filter in Office 365
Exchange Online Protection – Office 365 Spam Filter Protection from spam and malware while maintaining access to email during and after...

ALIF Consulting
Mar 13, 20223 min read
Â
Â
Â
![ATP Policy [Safe Links, Safe Attachments]](https://static.wixstatic.com/media/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.png/v1/fill/w_435,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.webp)
![ATP Policy [Safe Links, Safe Attachments]](https://static.wixstatic.com/media/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.png/v1/fill/w_454,h_261,fp_0.50_0.50,q_95,enc_avif,quality_auto/2bb91d_905fe8f73aac422d8888de690d8c3066~mv2.webp)
ATP Policy [Safe Links, Safe Attachments]
“ Microsoft Office 365 Advanced Threat Protection (ATP) is a cloud-based email filtering service that helps protect your organization...

ALIF Consulting
Mar 13, 20223 min read
Â
Â
Â


Authentication in Office 365
The purpose of cloud-based authentication is to protect companies from hackers trying to steal confidential information. Cloud...

ALIF Consulting
Mar 13, 20224 min read
Â
Â
Â


What is eDiscovery and Content Search in Office 365
Electronic discovery, or eDiscovery, identifies and delivers electronic information that can be used as evidence in legal cases. You can...

ALIF Consulting
Mar 13, 20224 min read
Â
Â
Â
bottom of page
