SlideShare a Scribd company logo
Virtual Networking
Security
Perimeter Security
Hello!
I am Eng Teong Cheah
Microsoft MVP
2
Perimeter Security
3
Defense in Depth
4
Provide a layered approach and
multiple levels of protection
DDoS
Azure Firewall
Virtual Network Security
5
Virtual Networks
Distributed Denial of Service (DDoS)
6
DDoS Implementation
7
Azure Firewall Implementation
8
VPN Forced Tunneling
9
User Defined Routes and Network Virtual Appliances
10
Thanks!
Any questions?
You can find me at:
@walkercet
12
References
◎ https://docs.microsoft.com/en-us/
13

More Related Content

What's hot (20)

KEY
mod_security introduction at study2study #3
Naoya Nakazawa
 
PDF
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
PPTX
Top 10 security risks for mobile backend developers
Jiri Danihelka
 
PPTX
Security on Windows Azure
Haddy El-Haggan
 
PDF
Introduction to Mod security session April 2016
Rahul
 
PDF
Cld006 azure v_net___express_route_最新情報
Tech Summit 2016
 
PPTX
Mod security
Shruthi Kamath
 
PDF
[Cluj] CSP (Content Security Policy)
OWASP EEE
 
PDF
Future of Web Security Opened up by CSP
Muneaki Nishimura
 
PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
PPTX
Web & Cloud Security in the real world
Madhu Akula
 
PDF
20 common security vulnerabilities and misconfiguration in Azure
Cheah Eng Soon
 
PDF
CDI and Seam 3: an Exciting New Landscape for Java EE Development
Saltmarch Media
 
PPTX
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
DOC
Strayer cis 333 entire course
uopassignment
 
PPTX
Virtualization Security
syrinxtech
 
PPTX
[OWASP Poland Day] Saving private token
OWASP
 
PPTX
Class Project: Security in Microsoft Azure
saitoserge
 
PPTX
Web Application firewall-Mod security
Romansh Yadav
 
PDF
Mod Security
Abhishek Singh
 
mod_security introduction at study2study #3
Naoya Nakazawa
 
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
Top 10 security risks for mobile backend developers
Jiri Danihelka
 
Security on Windows Azure
Haddy El-Haggan
 
Introduction to Mod security session April 2016
Rahul
 
Cld006 azure v_net___express_route_最新情報
Tech Summit 2016
 
Mod security
Shruthi Kamath
 
[Cluj] CSP (Content Security Policy)
OWASP EEE
 
Future of Web Security Opened up by CSP
Muneaki Nishimura
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
Web & Cloud Security in the real world
Madhu Akula
 
20 common security vulnerabilities and misconfiguration in Azure
Cheah Eng Soon
 
CDI and Seam 3: an Exciting New Landscape for Java EE Development
Saltmarch Media
 
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
Strayer cis 333 entire course
uopassignment
 
Virtualization Security
syrinxtech
 
[OWASP Poland Day] Saving private token
OWASP
 
Class Project: Security in Microsoft Azure
saitoserge
 
Web Application firewall-Mod security
Romansh Yadav
 
Mod Security
Abhishek Singh
 

More from Eng Teong Cheah (20)

PDF
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
PDF
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
PDF
Monitoring Models
Eng Teong Cheah
 
PDF
Responsible Machine Learning
Eng Teong Cheah
 
PDF
Training Optimal Models
Eng Teong Cheah
 
PDF
Deploying Models
Eng Teong Cheah
 
PDF
Machine Learning Workflows
Eng Teong Cheah
 
PDF
Working with Compute
Eng Teong Cheah
 
PDF
Working with Data
Eng Teong Cheah
 
PDF
Experiments & TrainingModels
Eng Teong Cheah
 
PDF
Automated Machine Learning
Eng Teong Cheah
 
PDF
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
PDF
Hacking Containers - Container Storage
Eng Teong Cheah
 
PDF
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
PDF
Hacking Containers - Linux Containers
Eng Teong Cheah
 
PDF
Data Security - Storage Security
Eng Teong Cheah
 
PDF
Application Security- App security
Eng Teong Cheah
 
PDF
Compute Security - Container Security
Eng Teong Cheah
 
PDF
Access Security - Hybrid Identity
Eng Teong Cheah
 
PDF
Access Security - Privileged Identity Management
Eng Teong Cheah
 
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
Monitoring Models
Eng Teong Cheah
 
Responsible Machine Learning
Eng Teong Cheah
 
Training Optimal Models
Eng Teong Cheah
 
Deploying Models
Eng Teong Cheah
 
Machine Learning Workflows
Eng Teong Cheah
 
Working with Compute
Eng Teong Cheah
 
Working with Data
Eng Teong Cheah
 
Experiments & TrainingModels
Eng Teong Cheah
 
Automated Machine Learning
Eng Teong Cheah
 
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
Hacking Containers - Container Storage
Eng Teong Cheah
 
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
Hacking Containers - Linux Containers
Eng Teong Cheah
 
Data Security - Storage Security
Eng Teong Cheah
 
Application Security- App security
Eng Teong Cheah
 
Compute Security - Container Security
Eng Teong Cheah
 
Access Security - Hybrid Identity
Eng Teong Cheah
 
Access Security - Privileged Identity Management
Eng Teong Cheah
 
Ad

Recently uploaded (20)

PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Ad

Virtual Networking Security - Perimeter Security