Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Lilly Taylor
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
How long should we retain eDiscovery data?
On
Manage standard eDiscovery cases (not including Premium eDiscovery)
It's crucial to configure these correctly to avoid performance bottlenecks.
On
Recommend a datacenter firewall integration strategy
I had issues with the VM creation steps provided here. Some steps were not clearly explained.
On
Create a VM
For those who have implemented this in production, any tips on potential pitfalls?
On
Create and manage a managed identity for Azure resources
We've seen a rise in productivity by allowing guest access.
On
allow or prevent owners from adding guests
Does anyone know if the vulnerability scans impact the performance of VMs in any significant way?
On
Evaluate vulnerability scans from Microsoft Defender for Cloud
Can dynamic data masking be combined with row-level security for finer control?
On
Configure dynamic masking on SQL workloads
Conditional Access Policies can be tricky to configure. Any tips on avoiding common pitfalls?
On
Create, configure, and manage groups
Authentication is the process of verifying the identity of a user, device, or other entity in a computer system.
On
Define authentication
Thanks for the detailed explanation of Azure Monitor.
On
Describe Azure Monitor, including Log Analytics, Azure Monitor alerts, and Application Insights
Search for:
x