![White Clouds](https://images.pexels.com/photos/2775196/pexels-photo-2775196.jpeg?auto=compress&cs=tinysrgb&w=1920)
Azure Native Services for Microsoft Enterprise offer a range of benefits, including increased scalability and flexibility. This is particularly useful for businesses with fluctuating workloads, as they can quickly scale up or down to meet changing demands.
One of the key advantages of Azure Native Services is its ability to integrate seamlessly with other Microsoft tools and services. This allows businesses to leverage existing investments and expertise, while also taking advantage of the latest cloud technologies.
Azure Active Directory (AAD) is a key component of Azure Native Services, providing secure identity and access management for users and applications. With AAD, businesses can easily manage user identities, access permissions, and authentication processes.
Azure Active Directory B2C allows businesses to provide secure and personalized experiences for customers, while also reducing the complexity and cost associated with managing multiple identity systems.
Discover more: Azure Cloud Native
Azure Native Services
Azure Native Services are designed to provide robust security features for your multi-cloud and on-premises environments. Azure Sentinel is a key player in this space, serving as a native security information and event management (SIEM) tool.
A different take: Connections - Oracle Fusion Cloud Applications
Azure Sentinel comes with built-in data connectors that allow you to consolidate information from various sources. This helps you to analyze the data, detect threats, and respond to incidents in a timely manner.
Some of the notable features of Azure Sentinel include threat detection, incident response, and threat hunting. Threat detection continuously analyzes data from various sources to identify the root cause of security threats. Incident response fast-tracks incident response for identified threats via built-in automation and orchestration features available through playbooks. Threat hunting is powered by the MITRE framework, which proactively identifies security threats. This is reinforced by Jupyter notebooks and integration with the Azure Machine Learning workspace.
Azure Sentinel's features can be summarized as follows:
- Threat detection: Continuously analyzes data from various sources to identify the root cause of security threats
- Incident response: Fast-tracks incident response for identified threats via built-in automation and orchestration features available through playbooks
- Threat hunting: Engine based on the MITRE framework that proactively identifies security threats; Jupyter notebooks and integration with the Azure Machine Learning workspace reinforces threat hunting capabilities
Link Multiple Subscriptions to One Dynatrace Environment
Linking multiple Azure subscriptions to one Dynatrace environment is optional, but it can be a game-changer for large-scale deployments.
To link multiple subscriptions, you'll need to ensure your Azure account has access to the Dynatrace account with the following permissions: View Account, View Environment, Install OneAgent, and Manage Monitoring Settings.
For another approach, see: Azure App Service Environment Variables Key Vault
You can link more Azure subscriptions to your newly created Dynatrace environment, and you can also link more Dynatrace environments to a single Azure subscription. To do this, you'll need Dynatrace Account privileges, specifically tenant-manage-settings and tenant-agent-install permissions.
To link multiple subscriptions, follow these steps:
1. Go to the Azure Portal and search for Azure Native Dynatrace Service from the top search bar.
2. Select Azure Native Dynatrace Service.
3. Select Create.
4. In Basics, specify whether to create a new resource group or use an existing one.
5. Enter a Resource name and select a Region from the dropdown menu.
6. Select the Dynatrace environment to link to the Azure subscription.
7. Select Next: Metrics and Logs.
8. Optional: Select whether to Send subscription activity logs and/or Send Azure resource logs.
9. Skip Next: Single sign-on and select Next: Tags.
10. Optional: Specify tags for the new Dynatrace resource.
11. Select Next: Review + create.
12. Verify the information and select Create.
Note that when linking multiple subscriptions, you'll need to repeat this procedure for every subscription you want to link.
Consider reading: Azure Create New App Service
Deploy OneAgent on VMs
To deploy OneAgent on Azure Virtual Machines, go to your Dynatrace resource and select Virtual Machines.
You can install the OneAgent extension on a Virtual Machine by selecting it from the list, then choosing Install extension.
The installation process requires you to select whether to enable log analytics and to provide a host group for OneAgent, if desired.
After installation, the OneAgent status for the selected Virtual Machine displays Installed.
To see details about the installed OneAgent, select your Virtual Machine and go to Extensions.
If you need to uninstall OneAgent, select your Virtual Machine and then select Uninstall extension.
To install OneAgent on a Virtual Machine Scale Set, use the Dynatrace OneAgent extension for Virtual Machines and create a PaaS token.
Here's a step-by-step guide to installing OneAgent on a Virtual Machine:
- On the Azure Portal, go to your Dynatrace resource and select Virtual Machines.
- Select a Virtual Machine from the list, on which you want to install the OneAgent extension.
- Select Install extension.
- Optional: Select whether to enable log analytics and provide a host group for OneAgent.
- Select OK to start the installation process.
Microsoft Enterprise
Microsoft Enterprise offers a complete geospatial system with ArcGIS Enterprise on the Azure cloud, allowing you to leverage your existing investments in Microsoft and Esri.
Suggestion: Microsoft Azure Services Appauthentication
You can deploy ArcGIS Enterprise in the Azure cloud and use Azure's highly resilient infrastructure to read, use, and create cloud-native databases and storage services.
By centralizing your deployment and management, you can reduce overhead and improve IT governance with Azure's virtual desktop, securely accessing ArcGIS Pro, Esri's professional desktop GIS software.
ArcGIS Pro allows you to visualize and analyze data, create advanced 2D and 3D maps, and share your work from anywhere, making it a powerful tool for your geospatial needs.
For more insights, see: Azure Remote Desktop Services
Cloud Pro
You can securely access ArcGIS Pro through Azure's virtual desktop, reducing overhead and improving IT governance by centralizing your deployment and management.
ArcGIS Pro allows you to visualize and analyze data, create advanced 2D and 3D maps, and share your work from anywhere.
Yes, ArcGIS runs on Azure, leveraging the Microsoft Azure cloud for infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), and managed services.
This means you can use ArcGIS to its full potential without worrying about the underlying infrastructure, giving you more time to focus on your work.
Recommended read: Oracle Cloud Infrastructure Foundations Associate Certification Cost
Supported in Government Environments
ArcGIS on Azure is a great option for government environments. It has been successfully implemented with Microsoft Azure, Azure Government, and Azure Government Secret.
Each of these options can be considered according to individual customer needs. This flexibility is a big plus for government agencies who have specific requirements.
ArcGIS has been proven to work well with Azure Government, making it a reliable choice for government projects.
Policy
Azure Policy is a powerful tool that helps implement security standards and assess organizational-specific compliance requirements. It defines and enforces rules that govern how resources are created, configured, and managed.
Policy definitions are the building blocks of Azure Policy, allowing you to create custom policies that implement standards for ensuring resource standards, cost management, and security. For example, you can use policy definitions to require authentication to Linux machines through SSH keys.
Initiatives are a way to group multiple Azure policies together to manage overarching security goals. This simplifies Azure policy management, especially in large complex deployments.
Consider reading: Windows Azure Service Management Api
RBAC permissions control access to Azure policy resources, ensuring that only authorized users can make changes. This is crucial for maintaining the security and integrity of your Azure resources.
Remediation tasks can be created in Azure Policy to address non-compliant resources and enforce compliance. This ensures that your resources are always up to date and compliant with your organization's standards.
Purview
Azure Purview is a game-changer for data governance. It helps ensure the security and compliance of your information by providing a unified catalog of your data estate, creating a holistic view of what data you have and where it resides.
With data catalog, you can see all your data in one place, making it easier to manage and protect. This feature is particularly useful for large organizations with diverse data environments.
Data lineage is another crucial feature of Azure Purview. It shows how data flows in your cloud environment, as well as how it's used and transformed. This helps you understand the entire data lifecycle and identify potential security risks.
Discover more: Azure App Service Security Vulnerability
Data classification is also a key benefit of Azure Purview. It enables you to classify sensitive data in your system and understand how it's used. This is essential for protecting sensitive information and ensuring compliance with regulatory requirements.
Here are some of the key benefits of Azure Purview:
- Data catalog: Provides a unified catalog of your data estate
- Data lineage: Shows how data flows in your cloud environment
- Data classification: Robust capabilities to classify sensitive data
- Data security: Data loss prevention, information protection, insider risk management, and privileged access management
Sentinel
Azure Sentinel is a game-changer for security and compliance. It serves as Azure's native security information and event management (SIEM) tool for multi-cloud and on-premises environments.
Azure Sentinel comes with built-in data connectors that allow you to consolidate information from various sources. This includes threat detection, which continuously analyzes data to identify the root cause of security threats.
Incident response is another key feature of Azure Sentinel. It fast-tracks incident response for identified threats via built-in automation and orchestration features available through playbooks.
Threat hunting is also a powerful tool in Azure Sentinel. It uses an engine based on the MITRE framework to proactively identify security threats, and Jupyter notebooks and integration with the Azure Machine Learning workspace reinforce threat hunting capabilities.
Azure Sentinel is a comprehensive security solution that provides visibility into security threats and enables you to respond quickly and effectively.
Setup and Configuration
To set up the Azure Native Dynatrace Service, you first need to create a new Dynatrace resource in the Azure subscription and resource group that you select during the installation deployment. This Dynatrace resource is created in the Azure subscription and resource group, and you can configure, manage, and troubleshoot issues on it from the Azure Portal.
You'll need to select a region for your Dynatrace resource and environment, which will be created in the same region. You can choose from a list of available regions in the dropdown menu. The Dynatrace resource and environment will be created in the selected region.
To set up the integration, follow these steps:
- Create a new resource group or use an existing one.
- Enter a Resource name for the Dynatrace resource.
- Select your Pricing plan.
You can also choose to send subscription activity logs and/or send Azure resource logs to Dynatrace. If you select Send Azure resource logs for all defined services, Azure resource logs are sent for all defined resources by default.
Prerequisites
Before you start setting up Dynatrace, there are a few things you need to do first.
Register the Dynatrace resource provider to ensure it's recognized by Azure.
To do this, follow the instructions on Azure resource providers and types.
You'll also need to set up permissions to give Dynatrace the necessary access to your Azure resources.
Integration Setup
To set up the integration, you'll first need to deploy the Azure Native Dynatrace Service. This will create a new Dynatrace environment hosted on a new Dynatrace resource, which can be managed and troubleshooted from the Azure Portal.
The Dynatrace resource is created in the Azure subscription and resource group you select during installation deployment. You can configure it to send subscription activity logs and Azure resource logs to Dynatrace.
To deploy the Azure Native Dynatrace Service, go to the Azure subscription where you want to create the Dynatrace resource, and select Resources. Then, select Create and search for Azure Native Dynatrace Service.
You should see a private product available, which you'll need to select and subscribe to. On the Create a new Dynatrace environment page, select Create and follow the prompts to set up the resource group, resource name, region, and pricing plan.
You can also choose to enable single sign-on (SSO) through Microsoft Entra ID, and specify tags for the new Dynatrace resource. Be sure to verify the information submitted before creating the resource.
For your interest: How to Create a Service Principal in Azure
Here's a step-by-step guide to deploying the Azure Native Dynatrace Service:
1. Go to the Azure subscription where you want to create the Dynatrace resource.
2. Select Resources and then Create.
3. Search for Azure Native Dynatrace Service and select the tile.
4. Select the private plan you accepted and then Subscribe.
5. On Create a new Dynatrace environment, select Create.
6. Set up the resource group, resource name, region, and pricing plan.
7. Choose to enable SSO through Microsoft Entra ID (if desired).
8. Specify tags for the new Dynatrace resource (if desired).
9. Verify the information submitted and select Create.
After deploying the Azure integration, you can register the Dynatrace resource provider, set up permissions, and follow the instructions on Azure resource providers and types.
On a similar theme: Azure App Service Plan
Activating Logs After Deployment
Activating logs after deployment is a straightforward process. You can do this on the Azure Portal by going to your Dynatrace resource and selecting Metrics and logs.
First, you need to select Send subscription activity logs. This will enable the collection of subscription activity logs from Azure to Dynatrace.
Next, select Save to confirm your changes. That's it for subscription activity logs.
If you want to collect Azure resource logs, you need to follow a similar process. Select Send Azure resource logs for all defined sources to enable log collection for all supported resources.
You can also use Azure resource tags to filter the specific set of Azure resources sending logs to Dynatrace. If you don't set any tags, all logs from the monitored resources on your Azure subscription will be sent to Dynatrace.
Here's a summary of the steps:
Uninstall Dynatrace Service
Uninstalling the Dynatrace Service is a straightforward process that stops logs and metrics from being sent to Dynatrace and also halts billing through Azure Marketplace.
To begin, you'll need to delete the Dynatrace resource in Azure. This can be done by following these steps:
- Go to the Azure Portal and navigate to your Dynatrace resource.
- Select the Overview option.
- Choose Delete.
- Enter the name of the application you want to delete, then select Delete.
After completing these steps, you'll have successfully uninstalled the Azure Native Dynatrace Service.
Events
Events are collected automatically through the Azure integration, allowing you to view them in Datadog's Event explorer.
To view Azure Service Health events, navigate to the Event explorer and filter for the Azure Service Health namespace.
Azure integration metrics, events, and service checks receive additional tags, including those defined in your Azure environments.
These tags provide more context and help you better understand the data in Datadog.
Additional reading: Microsoft Azure Health
Frequently Asked Questions
What are Azure native applications?
Azure native applications are cloud-based solutions built on the Azure platform, leveraging its scalability, security, and reliability. They are developed, managed, and supported by Microsoft to help organizations deploy applications efficiently.
What are the Azure native tools?
Azure native tools are a collection of powerful services including Virtual Machines, SQL, and Kubernetes Service, designed to help you build, deploy, and manage applications in the cloud. These tools provide a scalable and secure foundation for your cloud infrastructure and data management needs.
What are different types of Azure services?
Azure offers a range of AI services, including Machine Learning, AI Services, and Copilot, which enable developers to build intelligent applications and automate tasks. These services include Azure OpenAI Service, Azure AI Studio, Azure AI Vision, Azure AI Search, and Azure AI Bot Service.
What is the difference between Azure native and AVS?
AVS (Azure VMware Solution) offers a managed VMware environment in Azure, while Azure Native services provide a pay-as-you-go model for businesses with fluctuating needs. The key difference lies in their infrastructure and pricing structures.
What does "Azure Native" mean?
Azure Native refers to cloud-based services developed and managed by Microsoft, built on the Azure cloud platform for scalable and secure application deployment. These services leverage the reliability of Azure's infrastructure to support business growth and innovation.
Sources
- https://www.elastic.co/guide/en/observability/current/monitor-azure-native.html
- https://docs.dynatrace.com/docs/setup-and-configuration/microsoft-azure-services/azure-platform/azure-native-integration
- https://www.esri.com/en-us/about/partners/our-partners/strategic-alliances/microsoft/azure-cloud/microsoft-cloud
- https://www.wiz.io/academy/azure-security-tools
- https://docs.datadoghq.com/integrations/azure/
Featured Images: pexels.com