Using Managed Identities in Azure Automation Accounts (preview)

Whether it’s to repeat common tasks or to automatically respond to a trigger, IT Pros look to automation to help streamline their work and improve their response times. In Azure, runbooks stored in Azure Automation accounts need to use credentials of a… Continue reading Using Managed Identities in Azure Automation Accounts (preview)

Lesson Learned #169: Bulk Insert using Python in Azure SQL

Today, I worked in a very interesting case where our customer wants to insert millions of rows using Python. We reviewed two alternatives to import the data as soon as possible: Using BCP command line and using executemany command. Following I would li… Continue reading Lesson Learned #169: Bulk Insert using Python in Azure SQL

Setting up Client Certificate Authentication for WCF Service hosted as an Azure Web App

Recently I worked on a scenario where we had to set up client cert authentication for WCF service hosted as an App service in Azure: We followed the below steps to achieve the same and was able to parse the client certificate in service end using custo… Continue reading Setting up Client Certificate Authentication for WCF Service hosted as an Azure Web App

Disable proxy output for /jsdebug or /js endpoint of WCF service consumed using Javascript or Ajax

Recently I worked on a scenario where we had to disable the proxy output for /jsdebug or /js endpoint for security concerns: We were able to achieve the same using following steps:
 
When we consume a Wcf service or Webservice  using Java scr… Continue reading Disable proxy output for /jsdebug or /js endpoint of WCF service consumed using Javascript or Ajax

Announcing the iOS/iPadOS Security Configuration Framework

As mobile usage becomes more prevalent, so does the need to protect your work or school data on those devices. In March 2020, we introduced the App Protection Policy Data Protection Framework to help organizations determine which Intune app protection … Continue reading Announcing the iOS/iPadOS Security Configuration Framework

Collect memory dumps for a first-chance exception, when it occurs

The following two procedures guide on how to properly collect a memory dump to study a process crash. This post complements my article about how exceptions are handled and how to collect memory dumps to study them. 
 
Both tools below – ProcD… Continue reading Collect memory dumps for a first-chance exception, when it occurs