-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

  • microsoft-365-l1-desktop-support-new-user-creation-setup

      

    microsoft-365-l1-desktop-support-new-user-creation-setup


     

    Microsoft-365-L1-Desktop-Support-guide


    This article is designed as a practical, User onboarding is a critical responsibility for L1 Desktop Support teams in enterprise environments. When a new employee joins, IT must ensure proper account creation, access provisioning, and mailbox setup without security gaps or permission errors. In hybrid environments (On-Prem AD + Microsoft 365), the process involves Active Directory configuration followed by synchronization to Azure AD. This guide explains the standard real-world workflow followed by service desk engineers during new user creation.

    I will write article on each topic for single single blog -


    I’ll break into real helpdesk categories:

     

    1. Unlock user
    2. Reset password
    3. Enable / Disable account
    4. Create new user
    5. Add user to group
    6. Remove user from group
    7. Check login issues
    8. Move user to correct OU
    9. Basic permission via groups

     

    Today we will see step by step Account & License Management  

     

     

    👤 SCENARIO 1 — Create new user (new user join)

     

    ✅ Step 1 — Create User in Active Directory


    User accounts are created in:

    Active Directory Users and Computers (ADUC)



    You can open it via:

    • dsa.msc


    📍 Navigate to Proper OU


    Inside ADUC:

     

    • Expand Domain Name (Example: company.local)
    • Navigate to correct OU (Organizational Unit) – e.g., Accounts / Users
    • Right-click the OU
    • Select New → User
    • Fill Required Details:
    • First Name
    • Last Name
    • Full Name
    • Username (SamAccountName)
    • User Logon Name (UPN)
    • Click Next




    Set Password & Account Options:

    ✔ User must change password at next login
    ✔ Password never expires (Company policy based)
    ✔ Account enabled


    Click Next → Finish

    User account is successfully created.




    🎯 Best Practice


    • Always create users inside the correct OU to ensure:
    • Proper Group Policy application
    • Security compliance
    • Automatic script execution (if configured)





    ✅ Step 2 — Add User to Security Groups




    After account creation, assign access based on job role.



    Most Used Method:


    • Right-click User
    • Select Properties
    • Go to Member Of tab




    You may see default group:




    Name            | Location
    -----------------------------------
    Domain Users    | test.com/Users
    To Add User to Required Groups:


    Click Add



    • Enter group name (e.g., VPN_Users, Email_Users, Finance_Share)
    • Click Check Names
    • Click OK
    • Click Apply
    • Typical Groups Assigned:
    • Email Access Group
    • VPN Access Group
    • File Server Access Group
    • Printer Access Group
    • Department Security Group



    💬 Professional Interview Answer Line



    “I will open ADUC using dsa.msc, navigate to the appropriate OU, create a new user via New → User, configure password policies, enable the account, and assign necessary security groups through the Member Of tab to provide email, VPN, file, and printer access based on the user’s role.”



    ✅ Step 3 — Inform Microsoft 365 Admin (Hybrid Environment)



    • If organization uses Hybrid AD setup:
    • User account syncs via:
    • Azure AD Connect



    Process:


    • Wait for Azure Sync cycle
    • Verify user appears in Microsoft 365 Admin Center
    • License will be assigned by M365 Admin team
    • Once license is assigned:
    • Mailbox gets provisioned
    • Teams access enabled
    • OneDrive created



    🔍 Verification Steps After Sync


    • Check user appears in Microsoft 365 portal
    • Confirm license assigned
    • Verify mailbox created in Exchange Online
    • Confirm Teams login works




    🚨 Step 4 — Escalation Criteria



    • Escalate to L2 / Cloud Admin if:
    • User not syncing to Azure AD
    • Sync errors in Azure AD Connect
    • No mailbox created after license assignment
    • Duplicate UPN conflict
    • Azure AD provisioning issue



    Before escalation, document:


    • OU location
    • Groups assigned
    • Time of account creation
    • Sync cycle time
    • Error screenshot (if any)



    📝 Real Helpdesk Documentation Format

    Request: New User Creation – Finance Department
    Action Taken:
    Created user in AD → Assigned groups → Confirmed sync → Informed M365 admin

    Pending: License assignment
    Status: Awaiting mailbox provisioning



    🔐 L1 Best Practices



    • ✔ Always verify HR approval before account creation
    • ✔ Follow naming convention standard
    • ✔ Assign minimum required permissions (Least Privilege Principle)
    • ✔ Confirm department-specific groups
    • ✔ Document everything in ticket



    ✅ Quick Checklist Summary


    • ✔ Create user in correct OU
    • ✔ Set password policy
    • ✔ Enable account
    • ✔ Add required groups
    • ✔ Wait for Azure sync
    • ✔ Inform M365 Admin
    • ✔ Verify mailbox creation






    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.






  • Microsoft-365-L1-Desktop-Support-Move-User-To-Correct-OU

     


     

    Microsoft-365-L1-Desktop-Support-guide


    This article is designed as a practical, In enterprise environments, users are organized in Organizational Units (OUs) within Active Directory to apply department-based policies, security controls, and access permissions. When an employee changes department, role, or location, moving the user to the correct OU becomes an essential L1 support task.

    Improper OU placement can result in login issues, incorrect Group Policy Objects (GPOs), missing permissions, or security misconfiguration. This guide explains the standard L1 workflow for safely moving users between OUs.

     

    I will write article on each topic for single single blog -


    I’ll break into real helpdesk categories:

     

    1. Unlock user
    2. Reset password
    3. Enable / Disable account
    4. Create new user
    5. Add user to group
    6. Remove user from group
    7. Check login issues
    8. Move user to correct OU
    9. Basic permission via groups

     

    Today we will see step by step Account & License Management  

     

    📂 SCENARIO — Move User to Correct Organizational Unit (OU)

     

     Here is your complete structured blog article content for the title:



    🔎 When Is This Required?


    • This action is typically performed when:
    • Employee department changed (e.g., Sales → IT)
    • Role or designation updated
    • Location transfer (Branch change)
    • GPO policy needs to be updated
    • Access level needs to align with new department
    • Incorrect OU placement during user creation




    1️⃣ Step 1 — Verify Authorization


    • Before moving the user:
    • Confirm HR approval or official department change email
    • Ensure service request/ticket is raised
    • Verify new department details
    • Confirm correct destination OU name
    • ⚠ Never move users without documented approval. OU structure affects security policies.





    2️⃣ Step 2 — L1 Action (Move User in ADUC)




    🖥 Using Active Directory Users and Computers (ADUC)
     

    Method 1 — Drag & Drop (Most Common)

     

    • Open ADUC
    • Locate the current OU (e.g., Sales)
    • Find the user account
    • Drag and drop the user into the new OU
    • Example:
    • Sales → IT Department OU
    • Confirm the move




    Method 2 — Right-Click Move Option


    • Open ADUC
    • Right-click the user
    • Select Move
    • Choose the correct destination OU
    • Click OK
    • This method is safer when OU hierarchy is complex.

    < br />

    3️⃣ Post-Move Validation


    • After moving the user:
    • Run gpupdate /force on user machine (if required)
    • Ask user to log off and log back in
    • Verify:
    • Folder access
    • Application access
    • Network drive mapping
    • Printer access
    • Confirm Outlook and VPN working properly
    • GPO policies may take time depending on replication and site configuration.



    4️⃣ Common Issues After OU Move


    • Sometimes after moving a user:
    • Login takes longer (GPO processing)
    • Access to previous department resources removed
    • New drives not mapping
    • Restrictions applied due to tighter policies
    • MFA / conditional access behavior changes (hybrid setup)
    • Always inform user about possible policy refresh delay.



    🚨 Escalate If

    • Escalate to L2 / AD Team if:
    • User cannot login after OU move
    • GPO not applying properly
    • Access conflicts occur
    • Replication issues between Domain Controllers
    • Hybrid sync issue (Azure AD Connect)
    • OU protected from accidental deletion and move fails
    • 🧠 Real Helpdesk Insight



    OUs are often linked to:

    • Group Policy Objects (GPOs)
    • Login scripts
    • Security baselines
    • Software deployment policies
    • BitLocker / Endpoint policies
    • Moving a user changes all applied policies. Always double-check the destination OU.


    ✅ L1 Checklist (SOP Style)



    • ✔ HR/Manager approval verified
    • ✔ Ticket logged
    • ✔ Correct OU identified
    • ✔ User moved via ADUC
    • ✔ GPO refresh completed
    • ✔ User login tested
    • ✔ Access validated
    • ✔ Escalated if required




    🎯 Interview-Ready Answer




    If interviewer asks how you move a user to a different department:

    “First, I verify HR approval and the correct target OU. Then I use ADUC to move the user either via drag-and-drop or the Move option. After the move, I ensure Group Policy refresh and validate that the user has appropriate access based on the new department. If GPO or replication issues occur, I escalate accordingly.”

     

     


    Disclaimer



    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

  • lan-cable-lights-explained-green-orange-meaning


    lan-cable-lights-explained-green-orange-meaning



    LAN Cable Lights Explained: What Do Those Blinking LEDs Mean?


    If you’ve ever plugged in a LAN cable and noticed two tiny blinking lights near the port, you’re not alone in wondering what they actually mean. These lights aren’t random—they’re quick indicators of your network connection status and performance.


    1. Green Light – Connection & Activity


    The green LED tells you whether your device is connected and actively communicating.


    * **Solid Green:** Your device is properly connected to the network.

    * **Blinking Green:** Data is being transferred (internet activity).

    * **Off:** No connection detected—check your cable or port.



    lan-cable-lights-explained-green-orange-meaning



    2. Orange (or Amber) Light – Speed & Performance


    The orange light usually indicates the speed or quality of your connection.


    * **Solid Orange:** High-speed connection (often 1 Gbps).

    * **Blinking Orange:** Ongoing network activity.

    * **Off:** Lower speed connection (like 10/100 Mbps) or limited capability.



    Why This Matters


    These small LEDs are actually powerful diagnostic tools. If your internet feels slow or isn’t working, a quick glance at these lights can help you identify whether the issue is with the connection, cable, or network speed.


    Final Thoughts


    Next time you see those blinking lights, you’ll know they’re not just flickering randomly—they’re giving you real-time feedback about your network health. Understanding them can save you time when troubleshooting and help you keep your connection running smoothly.





  • microsoft-azure-pricing-cost-management-payg-tco-cost-optimization

     

     

    microsoft-azure-pricing-cost-management-payg-tco-cost-optimization

     

     

    Azure Pricing & Cost Management

     

    Azure is one of the most popular cloud platforms, and many learners are eager to get started. However, beginners often feel overwhelmed due to the wide range of services and concepts. If you have no prior experience in cloud computing or Azure, the best place to start is with Azure Fundamentals (AZ-900). In this blog series, we will cover both theoretical concepts and practical hands-on exercises to help you build a strong foundation in Microsoft Azure.

    We will also provide a real-world, enterprise-level roadmap to guide your learning journey step by step.


    For Phase 1 (Cloud Fundamentals) the topics I listed are sufficient to understand Azure basics, but if your goal is to prepare properly for Microsoft Certified: Azure Fundamentals (AZ-900) and to build a solid base for later phases, you should expand Phase 1 slightly. 

    Think of Phase 1 as “cloud literacy + Azure platform orientation.
    Below is a complete but still beginner-level Phase 1 syllabus.


    Phase 1 — Azure Fundamentals (Expanded) - CLICK HERE 

    Phase 2 — Azure global infrastructure regions availability zones  (Expanded) - CLICK HERE   

    Phase 3 — Azure core services compute storage networking overview  (Expanded) - CLICK HERE    

    Phase 4 — azure-identity-access-management-entra-id-rbac-mfa-sso
    (Expanded) - CLICK HERE 

     

    5. Azure Pricing & Cost Management

     
    Very important in cloud environments.

    Topics:

    • Pay-as-you-go model
    • Pricing calculator
    • Total cost of ownership
    • Cost management dashboard
    • Resource tagging




    Describe factors that can affect costs in Azure



    Azure cost depends on what you use, how much you use, and how you configure it.

    OR

    Azure costs are influenced by factors such as resources type, consumption, maintenance, geography, subscription type, and azure marketplace usage.




    Core Idea 

    Azure = Pay as you use
    More usage -> More cost
    Less usage -> Less cost




    🔥 6 Main Factors That Affect Cost



    Just remember this -> R, C, M, G, S, M

    1. Resource type
    2. Consumption
    3. Maintenance
    4. Geography
    5. Subscription type
    6. Azure marketplace




    🧠 Now Understand Each in Simple Terms



    🔹 1. Resource Type



    Different services = different cost

    Example:
    VM (expensive)
    Storage (cheaper)

    Also depends on:
    Size
    Configuration
    Region



    microsoft-azure-pricing-cost-management-payg-tco-cost-optimization
    img src - learn.microsoft.com





    🔹 2. Consumption (VERY IMPORTANT 🔥)




    You pay based on usage

    Example:

    More VM hours -> more cost
    Less usage -> less cost


    Cost saving option


    Pay-as-you-go -> flexible
    Reserved -> cheaper (long-term)
    Savings plan -> flexible discount
    Spot VM -> cheapest (but can stop anytime)




    3. Maintenance

     

    Unused resources still cost money

    Example:

    Deleted VM but storage still running -> still paying
    Clean unused resources = save money




    4. Geography



    Location affects cost

    Example

    India vs US -> different pricing 

    also:

    Data transfer cost changes by region




    5. Subscription Type 



    There are different subscription types:

    Free credit
    Discounts
    Limits



    Example:

    Free trial -> free credit 
    Discounts
    Limits


    Example:

    Free trial -> free credits





    6. Azure Marketplace



    Third-party services cost extra

    Example:

    Prebuilt software
    Paid tools


    You pay:

    Azure cost + vendor cost





    Bonus transfer matters:

    Incoming data -> mostly free
    Outgoing data -> Cost





    What is Cost management ?



    Cost management provides the ability to quickly check azure resources costs, create alerts based on resource spend, and create budgets that can be used to automate management of resources.



    Credit alerts



    Credit alerts notify you when your azure credit monetary commitments are consumed. Monetary commitments are for organization with enterprise agreements (EAs). Credit alerts are generated automatically at 90% and at 100% of your azure credit balance. Whenever an alerts is generated, its reflected in cost alerts, and in the email sent to the account owners.



    Thank you for sharing - sharing is caring :-)




  • microsoft-azure-identity-access-management-entra-id-rbac-mfa-sso

     

    Identity and Access Basics

     

     

    Identity and Access Basics 

     

    Azure is one of the most popular cloud platforms, and many learners are eager to get started. However, beginners often feel overwhelmed due to the wide range of services and concepts. If you have no prior experience in cloud computing or Azure, the best place to start is with Azure Fundamentals (AZ-900). In this blog series, we will cover both theoretical concepts and practical hands-on exercises to help you build a strong foundation in Microsoft Azure.

    We will also provide a real-world, enterprise-level roadmap to guide your learning journey step by step.


    For Phase 1 (Cloud Fundamentals) the topics I listed are sufficient to understand Azure basics, but if your goal is to prepare properly for Microsoft Certified: Azure Fundamentals (AZ-900) and to build a solid base for later phases, you should expand Phase 1 slightly. 

    Think of Phase 1 as “cloud literacy + Azure platform orientation.
    Below is a complete but still beginner-level Phase 1 syllabus.


    Phase 1 — Azure Fundamentals (Expanded) - CLICK HERE 

    Phase 2 — Azure global infrastructure regions availability zones  (Expanded) - CLICK HERE   

    Phase 2 — Azure core services compute storage networking overview  (Expanded) - CLICK HERE    

     

     

    4. Identity and Access Basics 



    • Very important for your IT support role.
    • Understand identity services such as:
    • Azure Active Directory (Entra ID)


    Topics:

    • Users
    • Groups
    • Role Based Access Control (RBAC)
    • Multi-factor authentication
    • Single Sign-On (SSO)




    This connects strongly with Active Directory, which you already see in your job.


    In this module we will learn many things like as an Objective we will complete these modules.


    1) Describe directory services in azure, including Microsoft Entra ID and Microsoft Entra Domain Services.
    2) Describe authentication methods in Azure, including single sign-on (SSO), multifactor authentication (MFA), and passwordless.
    3) Describe external identities and guest access in Azure.
    4) Describe Microsoft entra conditional access.
    5) Describe azure role based access control (RBAC)
    6) Describe the concept of Zero trust.
    7) Describe the purpose of the defense in depth model.
    8) Describe encryption concepts and key management options in azure.
    9) Describe the purpose of Microsoft defender for cloud.

     

     

     

     

    1. Microsoft Entra ID (formerly azure ID)



    Cloud-based identity & access management (IAM) system.




    2. Microsoft Entra Domain Services



    Managed version of traditional active directory features in the cloud.
    Like - Domain Joining, Group policy, and LDAP - without the burdening of maintaining, patching and backing up physical or virtual domain controllers.






    Think of it as a 3-layer identity system :



    On-premises (left)

    Active directory (AD DS)
    Stores:
          Users and groups
          Devices
          Policies

    Uses:
        Kerberos / NTLM




    Sync Layer (middle)

    Microsoft entra connect
    Sync identities between:
         On-premises AD <--> Cloud

    This gives a hybrid identity (same user works everywhere)




    Cloud (right)

    Microsoft Entra ID (core brain)

    Hanldes:
        Authentication (login, MFA)
        Single Sign-On (SSO)
        App access
        Device policies



    Microsoft Entra Domain Services

    Provides:
        Domain join
        Group Policy
        LDAP
        Kerberos / NTLM


    👉 But without managing domain controllers



    Img src : learn.microsoft.com


     

    Key Concepts Simplified



    1. Authentication (who are you?)
    Login verification
    MFA, password reset, risk detection


    Example: Detects login from a new country



    2. Single Sign-On (SSO)

    One Login --> many apps

    Example: Login once --> access outlook, Teams, custom apps



    3. App management

    Connect SaaS + Internal apps
    Use same identity everywhere



    4. Device management

    Register devices
    Enforce rules (only company laptop allowed)



    How Sync Works (Very important)



    Flow:


    On-prem AD  ⇄  Entra Connect  ⇄  Entra ID  →  Domain Services
                   (bi-directional)   (one-way)



    Details:

    AD <--> Entra ID --> bi-directional Sync
    Entra ID --> Domain Services --> one-way only


    Meaning:

    Changes in AD <--> Entra ID sync both ways
    Domain Services does NOT sync back

     

     


    Why use this setup ?


    Benefits



    1. Hybrid identity


    Same user works:
       On-prem
       Cloud
       Apps




    2. Better security



    Detect suspicious logins
    Enforce MFA
    Conditional access




    3. No infrastructure management


    No need to manage domain controllers in azure




    4. Legacy + modern support



    Old apps --> use LDAP / Kerberos
    New apps --> use modern auth (OAUTH, SSO)




    Who uses it ?



    IT Admins --> Control access & Security
    Developers --> add login/SSO to apps
    Users --> manage passwords, sign on
    Subscriber --> Microsoft 365, Azure, etc




    Simple analogy

    Think of it like this:

    On-premises AD = your old office ID system
    Entra ID = Cloud identify hub (smart + secure)
    Entra Domain Services = legacy compatibility layer in cloud





    One-line Summary



    Microsoft Entra ID is the cloud identity brain, Entra Connect syncs identities, and Entra Domain Services provides traditional AD features without managing servers.



    Scenario: User signs in to a cloud app (e.g., Microsoft 365)



    User:

    Username: atul@hackingtruth.org
    Account originally created in on-prem active directory
    Synced to microsoft Entra ID



    Step-by-step login flow



    Step 1: User opens an app

    Example:

    Outlook / Teams / Custom SaaS app
    App redirects user to Microsoft Entra ID login page



    Step 2: User enters username

    atul@hackingtruth.org


    Microsoft entra ID checks:

    Does this user exist?
    Where is the identity coming from? (Cloud vs synced)



    Step 3: Authentication decision

    Now there are 3 possible paths depending on setup:



    Option A: Cloud authentication (most common)

    Password hash is synced to cloud
    Login happens directly in Microsoft entra ID

    👉 Flow:

    User → Entra ID → Password verified → success




    Option B: Pass-through authentication (PTA)


    Password stays on-prem
    Entra sends request to on-prem agent

    👉 Flow:

    User → Entra ID → On-prem agent → AD verifies → Response back




    Option C: Federation (eg. ADFS)

    Authentication fully handled on-prem

    👉 Flow:

    User → Redirect to ADFS → AD verifies → Token returned



    Step 4: Security checks (VERY Important)

    Before granting access, Microsoft Entra ID evaluates risk:

    Is login from new country ?
    Unknown device ?
    Suspicious behavior?


    Action

    Allow
    Block
    Require MFA



    Step 5: MFA (if required)

    Example:
          Phone notification
          OTP code


    Only after passing MFA --> continue




    Step 6: Token issued

    Entra ID generates a token (like a temporary pass)

    This token contains

    User identity
    Permissions
    Group



    Step 7: Single Sign-On (SSO)

    Now user can acces multiple apps without re-login

    • Outlook ✅
    • Teams ✅
    • SharePoint ✅
    • Custom apps ✅



    👉 Because they trust the same identity provider




    What about on-prem apps?



    If user accesses an on-prem app:


    With hybrid setup:
       can use:
           Kerberos / NTLM
           Or application proxy via Entra iD



    Where Domain Services fits

    If using Microsoft Entra DOmain Services:

    Example: Legacy app in Azure VM



    Flow:


    User (Entra ID)
       ↓
    Synced to Domain Services
       ↓
    VM uses LDAP / Kerberos





    Visualizing the whole flow



    [User]
       ↓
    [Microsoft Entra ID]  ← security + MFA + SSO
       ↓
       ├── Cloud Apps (M365, SaaS)
       ├── On-prem Apps (via proxy / federation)
       └── Domain Services (legacy apps)




    Key takeaway



    👉 Microsoft Entra ID is the gatekeeper

    It:

    Authenticates users
    Applies security policies
    Issues access tokens
    Enables SSO across everything




    Real-world analogy



    Think of it like airport security:

    • AD (on-prem) → your passport office
    • Entra ID → airport security + boarding system
    • MFA → extra identity check
    • Token → boarding pass
    • SSO → access to all gates without re-check






    FIDO2 Security Keys



    FIDO2 is an open standard for passwordless authentication built on the web authentication (WebAuthn) specification

    A physical key (USB / NFC / Bluetooth) used to login in without a password



    How is it works?



    1. Register the key - Plug in or tap it once
       Plus in or tap it once


    2. Login
       Choose "Security Key" at sign-in

    3. Authentication
       Tap the key (or use fingerprint on it)



    Users register a FIDO2 key and then select it at the sign-in screen as their primary authentication method. Because the hardware device handles authentication, there's no password that could be exposed or guessed.





    🧠 One-line takeaway

    👉 FIDO2 = plug key + tap = login (no password needed)




    Describe External Identities 


    External Identities (Guest user) can sound similar to single sign-on, but they're used for cross-tenant and consumer access scenarios. External users can bring their own identities, whether those are work accounts, government-issued digital identities, or socail identities such as google or facebook.






    Describe Azure conditional access



    Conditional access is a tool that microsoft entra ID uses to allow (or deny) access to resources based on identity signals. These signals include who the user is, where the user is, and what device the user is requesting access from.


    Conditional access helps IT administrators:

    Empower users to be productive wherever and whenever.
    Protect critical assets.



    Rule-based control for sign-ins

    • It decides:
    • ✅ Allow
    • 🔒 Require MFA
    • ❌ Block




    How is it works (3 steps)



    1. Collect signals

    Who (user / role)
    Where (location / IP)
    Device (managed or not)
    App being accessed




    2. Make a decision

    Based on rule you set:

    Normal login --> allow
    Risky login --> require MFA
    High risk --> block




    3. Enforce it

    Grant access
    Ask for MFA
    Deny access





    Real example

    Example 1

    Office location + known laptop
    👉 Allow (no MFA)



    Example 2

    Login from another country 
    👉 Require MFA



    Example 3

    Unknown device + risky sign-in
    👉 Block



    Example 4

    Admin account login
    👉 Always require MFA




    What you can control


    Require MFA for:
    Admins
    External access


    Allow only:
    Approved apps
    Managed devices


    Block:
    Unknown locations
    Risky sign-ins





    One-line takeaway

    👉 Conditional Access = “If these conditions are met → then allow / require MFA / block”




    Describe Azure role-based access control


    When you have multiple IT and engineering teams, how can you contorl what access they ahave to the resouces in your cloud enviornment? THe principle of least privilege says you should only grant access up to the level needed to complete a task. If you only need read access to a storage blob, then you should only be granted read access to that storage blob - not write access, and not access to other blobs. It's a good security practice to follow.




    Describe Zero Trust model




    Zero Trust Model 

    Never trust, always verify  with dont trust users, devices, or network so always check every request.


    Core idea

    Even if someone is: Inside your network ❌ NOT trusted
    Using company device ❌ NOT trusted

    👉 Everything must be verified first



     

    Principle 



    1. Verify explicitly

    Always check:
    User identity
    Location
    Device
    Risk level

    👉 Example: login from new country → require MFA




    2. Least privilege access



    Give minimum access needed

    Just-In-Time (temporary access)
    Just-Enough-Access (only what’s needed)

    👉 Example: admin access only for 1 hour



    3. Assume breach

    Act like attacker is already inside

    Segment access
    Monitor behavior
    Detect threats early

    👉 Example: limit access between systems




    Old vs Zero Trust



    | Old (Traditional)    | Zero Trust        |
    | -------------------- | ----------------- |
    | Trust inside network | Trust nothing     |
    | VPN = safe           | Always verify     |
    | One-time login       | Continuous checks |




    Real example


    User logs in from:

    Public WiFi
    Personal laptop



    👉 System checks:

    • Identity ✔️
    • Device ❌
    • Location ⚠️




    👉 Result:

    • Allow basic apps
    • Require MFA
    • Block sensitive access





    One-line takeaway


    Zero trust = verify every user, every device, every time === no exception.



    Describe defense-in-depth




    Multiple layers of security to protect data

    Not relying on one defense
    If one layer fails --> others still protect

    Like protect data by slowing down and stopping attackers




    Layers (outer --> inner)


    1. Physical 



    Physical Building, servers
    --> Locks, cameras



    2. Identity & Access



    Control who can access
    MFA, SSO, Permissions



    3, Perimeter



    Protect network edge
    Firewalls, DDoS protection



    4. Network



    Control internal traffic
    Segmentation, deny-by-default



    5. Compute



    Secure machines (VMs)
    Patching, antivirus



    6. Application



    Secure apps
    Fix vulnerabilities, secure code



    7. Data (Core)



    Protect actual data
    Encryption, access control




    Example



    Attacker tries to access data:

    Pass firewall ❌
    Gets blocked by MFA ❌
    Even if inside → data is encrypted ❌

    👉 Attack fails





    One-line takeaway



    👉 Defense-in-Depth = multiple security layers protecting data, not just one






    Describe encryption and key management in Azure



    Encryption helps protect data confidentiality by making data unreadable to unauthorized users.



    Encryption at rest and in transit


    • In Azure, encryption is commonly discussed in two forms:
    • Encryption at rest protects data when it is stored, such as in database, disks, and storage accounts.
    • Encryption in transit protects data while it moves between services, applications, and users.





    🔑 Key Management (Azure Key Vault)

    Central place to store and manage sensitive stuff


    Stores:

    Secrets (passwords, connection strings)
    Encryption keys
    Certificates (SSL / TLS)






    Why use key Vault ?



    • No hardcoding secrets in code
    • Control access (who can use keys)
    • Rotate keys regularly
    • Track usage (audit logs)




    Example


    App uses:

    Azure SQL (data stored)
    Azure Storage



    👉 Data is:

    Encrypted at rest ✔️
    Encrypted in transit ✔️


    👉 Keys stored in:

    Azure Key Vault




    Extra security features


    • 🔄 Key rotation (auto update keys)
    • 👤 Access control (RBAC)
    • 📊 Auditing (who used what)




    🧠 One-line takeaway



    👉 Encryption protects data, and Azure Key Vault securely manages the keys and secrets used for that encryption





    Microsoft Defender for Cloud (Simple Explanation)


    Microsoft defender for cloud is a security service that monitors, protects, and improves the security of your cloud and on-premises resources.




    Core Idea



    It does 3 main things :

    1. Assess (Find problems)
    2. Secure (Fix problems)
    3. Defend (stop attacks)


    This is the most important memory trick.



     

    What does it Protect ?



    Azure
    On-premises
    Hybrid
    Other clouds (AWS GCP)

    Means one dashboard for everything 



    1. Assess (Know Your Security Status)



    Finds:

    Weak passwords
    Open ports
    Vulnerabilities


    Gives:

    Recommendations
    Secure Score




    2. Secure (Improve Protection)



    Helps you.

    Apply security policies
    Follow best practices


    Example:

    Close unused ports
    Enable encryption



    3. Defend (Detect & Respond)



    Detects:


    Attacks
    Suspicious activity


     

    Gives:


    Alerts
    Fix suggestions




    Key Features (Compressed Version)

     

    • Security recommendations
    • Secure score
    • Threat alerts
    • Vulnerabilites scanning
    • Multi-cloud supports




    Real-Life example



    You create a VM with open ports

     

    • Defender for cloud:
    • Detecs risk
    • Suggest fix
    • Alerts if attack happens




    Important Concepts Made Easy



    Secure Score



    👉 A number showing how secure you are



    Higher score = better security ✅
    Lower score = more risk ❌



    Azure Arc



    👉 Helps connect:

    On-premises servers
    Other cloud resources

    👉 So Defender can monitor them too



    CSPM (Don’t Overthink)

    👉 Just remember:

    CSPM = checks your cloud security posture



    Exam Ready Answer


    👉
    Microsoft Defender for Cloud is a security management and threat protection service that helps assess, secure, and defend resources across Azure, hybrid, and multi-cloud environments.





    Memory Trick (Very Powerful)



    Defender = Security Guard 🛡️

    • - Checks your system (Assess)
    • - Fixes weaknesses (Secure)
    • - Stops attacks (Defend)




    Final One-Line Summary



    👉 Defender for Cloud continuously monitors your environment, improves security posture, and protects against threats.

     

     

     

     

     

  • microsoft-azure-core-services-compute-storage-networking-overview

     


     

     

     

    Azure is one of the most popular cloud platforms, and many learners are eager to get started. However, beginners often feel overwhelmed due to the wide range of services and concepts. If you have no prior experience in cloud computing or Azure, the best place to start is with Azure Fundamentals (AZ-900). In this blog series, we will cover both theoretical concepts and practical hands-on exercises to help you build a strong foundation in Microsoft Azure.

    We will also provide a real-world, enterprise-level roadmap to guide your learning journey step by step.


    For Phase 1 (Cloud Fundamentals) the topics I listed are sufficient to understand Azure basics, but if your goal is to prepare properly for Microsoft Certified: Azure Fundamentals (AZ-900) and to build a solid base for later phases, you should expand Phase 1 slightly. 

    Think of Phase 1 as “cloud literacy + Azure platform orientation.
    Below is a complete but still beginner-level Phase 1 syllabus.


    Phase 1 — Azure Fundamentals (Expanded) - CLICK HERE 

    Phase 2 — Azure global infrastructure regions availability zones  (Expanded) - CLICK HERE  

     

     

    Azure Core Services Overview

     
    You do not need deep knowledge yet — just understand what these services do.

    Compute

    • Example services:
    • Azure Virtual Machines
    • App Services
    • Containers



    Purpose: running applications and servers.

    ------------------------------------


    Storage

    • Learn basic storage services:
    • Azure Blob Storage
    • File storage
    • Disk storage
    • Archive storage



    Purpose: storing data.


    ------------------------------------

    Networking


    • Basic networking concepts in Azure:
    • Virtual Network (VNet)
    • Subnet
    • Public IP
    • Load balancer
    • VPN gateway



    You don’t need deep configuration yet — just understand the purpose.



    An easy way to differentiate between VMs and containers is - virtual machine virtualize the hardware and container is virtualize the operating system.
     

    The operating system level virtualization of containers is one reason why the container approach is more efficient than a full virtual machine.

    It allows you to run multiple lightweight containers on a single host without sacrificing the isolation that the virtual machine originally offered.

    Azure supports several container variations, the most popular being Docker.


    you can easily deploy and manage multiple containerized applications without worrying about which server will host each container.

    The decision of whether to use a VM or a container depends on how much flexibility you need


    If you need to completely control the environment, then you might choose a VM.

    If then the probability, performance characteristics and management capabilities of containers might be the better choice.




    In Microsoft azure, everything you build falls into 3 main categories.

    Compute -> Storage -> Networking



     


     

     

    1. Compute (Run application)


    A compute is the set of cloud services used to run applications, virtual machines, and workloads.


    Azure Virtual Machines (VMs)

    Azure virtual machines are on-demand, scalable computing resources that provide full control over the operating system and applications.

    Example - Run a windows/Linux Server



    App Services 

    Azure app services is a platform for building, deploying, and hosting web application without managing the underlying infrastructure.

    Example - Host a website or API



    Containers


    A containers are lightweight, portable units that package an application and its dependencies to run consistently across environment.

    Example - Run apps using docker



    2. Storage (Store data)



    Storage services in azure are used to store, manage, and retrieve data in a secure and scalable way.


    Blob Storage 

    Azure blob storage is an object storage service used to store large amounts of unstructured data such as an images, videos and documents.


    File Storage 

    Azure file storage provides fully managed file shares in the cloud that can be accessed via standard file protocol.


    Disk Storage

    Azure disk storage provides persistent block level storage volumes for use with virtual machine.


    Archive Storage 

    Azure Archive storage is a low-cost storage tier designed for long-term retention of infrequently accessed data.


    3. Networking 



    A networking services in azure enable communications between resources, users, and on-premises environment.



    Virtual Network (VNet)


    A virtual network is a logically isolated network in azure that allows resources to securely communicate with each other.



    Subnet


    A subnet is a segmented portion of a virtual network used to organize and manage resource efficiently.



    Public IP

    A public IP address is an internet routable IP address that allows azure resources to be accessed from outside the network.


    Load Balancer


    Azure load balancer distributes incoming network traffic across multiple resources to ensure high availability and reliability.


    VPN Gateway


    A VPN gateway enables secure communication between azure virtual networks and on-premises networks over the internet.


    Describe Azure virtual networking



    Virtual Network (VNet) = Your private network in Microsoft Azure
    Everything else is just features of that network.



    Remember does 6 things :



    VNet does 6 things:

     

    1. Isolate (Separate network)
    2. Connect (Azure resources)
    3. Internet Access
    4. Connect to on-premises
    5. Control traffic (routing)
    6. Secure traffic (filtering)


    That's it. That entire page = these 6 points.



    1. Isolation

    You can create multiple private networks. (like different departments)


    2. Communication

    Resources inside azure can talk to each other.



    3. Internet Access

    Add public IP -> accessible from internet.

     

    4. On-premises connection

    Connect your office network to azure.

     

    5. Routing 

    Decide where traffic should go.

     

    6. Security (Filtering)

    Allow or block traffic using rules.


     

     

    Visual Memory

     

     


     

    Azure Virtual Private Network (VPN) 



    VPN - Secure tunnel over the internet

    A VPN securely connects networks or devices over the public internet using encryption.


    Your Network <-- Encrypted Tunnel <-- Azure VNet

    Even though data goes over the internet.
    It is encrypted and safe.



    VPN Gateway 



    A VPN gateway is an azure service that enables secure communication between networks using VPN.


    Like

    1. Site-to-Site (S2S) -> office <-> Azure
    2. Point-to-Point (P2P) -> Laptop <-> Azure
    3. VNet-to-VNet -> Azure <-> Azure




    Types of VPN 



    1. Policy-Based

    Uses fixed rules (IP-based)
    Less flexible


    2. Route-Based 

    Uses routing tables
    More flexible & preferred


    Always remember 


    Route-based VPN = Recommended in Azure




    High Availability 

    Azure makes VPN reliable using:



    1. Active / Standby (default)

    Active VPN -> Working
    Standby VPN -> Backup


    If active fails -> standby takes over


    2. Active / Active

    Both gateways work at the same time
    High performance + redundancy


    3. ExpressRoute Failover

    If private connection fails -> VPN acts as backup


    4. Zone-Redundant Gateway

    Gateway spread across availability zones
    protects from data center failure



    How to remember this easily



    VPN = Secure Connection

    Gateway does 3 things:


    - Connect networks
    - Encrypt data
    - Provide high availability




    Final One-Line Summary



    Azure VPN securely connects networks and users to azure using encrypted tunnels, managed by VPN gateway with high availability support.


    Azure DNS is a hosting service that provides domain name resolution using Azure infrastructure, allowing you to manage DNS records with high availability, security and performance.

     

     

    Azure DNS - Simple understanding 


    Azure DNS is a service that translates domain name (like google.com) into IP addresses using Azure infrastructure.



    Human use names:
    www.google.com

    Computers use IP:
    142.250.x.x

    DNS = translator 



    What is Azure DNS ?



    Azure DNS lets you host and manage your domain's DNS record using Azure.

    means

    You control domain records
    Using azure tools


    Benefits 

    Instead of remembering all text, remember this:

    1. Fast (global network)
    2. Secure (RBAC + logs)
    3. Easy (same Azure tools)
    4. Private domains (VNet support)
    5. Smart mapping (alias records)



    1. Reliability & performance

    Uses global azure servers
    closest server answers -> faster

    Keywords: Anycast (closest server responds)



    2. Security 

    controlled using: 
    RBAC Role based access control (who can access)
    Logs (who did what)
    Locks (prevent deletion)


    3. Ease of Use

    Same tools as Azure:

    Portal
    CLI
    PowerShell

    No need to learn new system.



    4. Private DNS (very important)

    Use custom names inside your network

    Example 
    Instead of:
    vm123.internal.cloud

    You use:
    myserver.local




    5. Alias Records (Smart Features)

    Point domain to Azure resources.

    Example 

    Domain -> Public IP
    Domain -> CDN

    If IP changes -> auto update




    Important Note



    Azure DNS does NOT sell domain name

    You must buy from 

    Domain register
    Then connect to Azure



    Memory Trick



    DNS = Name -> IP
    Azure DNS = Manage DNS in Azure


    Benefits:
    Fast + Secure + Easy + Private + Smart






    Please share and thank you for your support. 

     


  • microsoft-azure-global-infrastructure-regions-availability-zones-architecture

     

     

    microsoft-azure-global-infrastructure-regions-availability-zones-architecture


     

    Azure is one of the most popular cloud platforms, and many learners are eager to get started. However, beginners often feel overwhelmed due to the wide range of services and concepts. If you have no prior experience in cloud computing or Azure, the best place to start is with Azure Fundamentals (AZ-900). In this blog series, we will cover both theoretical concepts and practical hands-on exercises to help you build a strong foundation in Microsoft Azure.

    We will also provide a real-world, enterprise-level roadmap to guide your learning journey step by step.


    For Phase 1 (Cloud Fundamentals) the topics I listed are sufficient to understand Azure basics, but if your goal is to prepare properly for Microsoft Certified: Azure Fundamentals (AZ-900) and to build a solid base for later phases, you should expand Phase 1 slightly. 

    Think of Phase 1 as “cloud literacy + Azure platform orientation.
    Below is a complete but still beginner-level Phase 1 syllabus.


    Phase 1 — Azure Fundamentals (Expanded) - CLICK HERE 


     Azure Global Infrastructure



    Understand how Azure is structured globally.

    Topics:

    • Regions
    • Region pairs
    • Availability zones
    • Edge locations
    • Datacenters




    Basic architecture units:

     

    • Resource
    • Resource group
    • Subscription
    • Management group



    These concepts are fundamental to operating in Microsoft Azure.




    1. Data centers

    A data center is just a building full of servers.

    like A huge room with thousand of computers running your apps.


    Key Idea

    This is where your data actually lives.
    Azure owns and manages these building.




    2. Regions (City)

    A region = group of data centers in one location and a specific geographic area defined by azure that contains one or more data centers


    Key Idea 

    This is where


    👉 Example:

    Central India ↔ South India

    OR

    Hyderabad (Region)  ↔  Chennai (Another Region)

    and Each region has multiple data centers


    These are :
    Close enough for low latency
    Far enough for safety (Used for disaster recovery)




    3. Region Pairs

    Every region has a backup region

    👉 Example:

    Central India ↔ South India


    Key Idea 

    Regions are paired far apart (~300 miles)
    If one region fails -> the other takes over


    This is for :

    Disaster Recovery
    Data backup



    Correct understanding of Region pair



    In Microsoft Azure :

    A region pair = Two regions in different locations
    Distance is typically hundreds of miles apart 

    100 miles is equal to 160.934 kilometers or we can say that roughly 161 or 160 km.

    100 miles = 160 km
    300 miles = 480 km





    4. Geographics

    A geography means collection of regions in a country/area

    Example:

    Europe
    Asia Pacific
    Americas


    Why important :

    Data stays withing legal boundaries
    Helps with compliance & regulations.




    5. Availability Zones

    Availability zones means separate data centers inside a region.

    Like One region -> Multiple isolated mini regions


    Key features:



    Each zone has:


    •  Separate power
    •  Separate network
    •  Separate cooling



    If one zone fails -> others still work


    Putting It All Together (Easy Flow)


    Geography (e.g. Asia)
       ↓
    Region (e.g. Central India)
       ↓
    Availability Zones (Zone 1, Zone 2, Zone 3)
       ↓
    Data Centers (actual servers)



    As per my example Availability zones separate but nearby or Same area → Availability Zones

    Ameerpet, Sr Nagar, Punjagutta



    Azure Architecture (Hyderabad Analogy)

     

     


     

    🔁 Region Pair (Disaster Recovery)



       🏙️ Hyderabad Region  ↔  🏙️ Chennai Region

       ✔ Far apart locations
       ✔ Backup & failover support
       ✔ Used during major outages
     

     

     📌 FLOW SUMMARY:



    Geography (India)
       ↓
    Region (Hyderabad)
       ↓
    Availability Zones (Ameerpet / SR Nagar / Punjagutta)
       ↓
    Data Centers (Actual server buildings)

    + Region Pair (Hyderabad ↔ Chennai)

     

     

    Basic architecture units:

     

    • Resource
    • Resource group
    • Subscription
    • Management group

     

     
    1. Resources (Smallest Unit)

     

    A resource is the actual thing you can create in azure

    Example :

    Virtual Machine
    Storage Account
    Database
    Web application


    Think :

    Resource = actual working service



    2. Resource Group


    A resource group = a folder that holds related resources

    Example :

    One project = one resource group

    Contains :

    Virtual Machine
    Database
    Storage


    Real-Life Example:

    Resource Group:

    Web App
    Database
    Storage





    3. Subscription

    A subscription = billing + access boundary

    It controls :

    Payment (billing)
    Access permissions
    Resource limits

    Think:

    Subscription = your azure account with money control



    Example :

    Company may have;

    Dev Subscription
    Test Subscription
    Production Subscription




    4. Management Group (Top Level)

    A management group = group of subscription

    Used in big organization


    Why?

    Apply policies to multiple subscription
    Manage access centrally


    Example:

    Company structure:

    Management group: Company
    Subscription 1: Dev
    Subscription 2: Prod





    🧾 One-Line Memory Trick



    Resources live in Resource groups, Resource Group live inside Subscription, and Subscriptions can be grouped using Management Groups.


  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.