
https://learn.microsoft.com/ko-kr/entra/fundamentals/five-steps-to-full-application-integration
Microsoft Entra ID와 앱을 통합하는 5단계 - Microsoft Entra
앱, 검색 및 통합 방법을 추가하여 애플리케이션을 Microsoft Entra ID와 통합하는 방법을 알아봅니다.
learn.microsoft.com
https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/whatis-azure-ad-connect
What is Microsoft Entra Connect and Connect Health. - Microsoft Entra ID
Learn about the tools used to synchronize and monitor your on-premises environment with Microsoft Entra ID.
learn.microsoft.com

https://getpractical.co.uk/2021/03/08/understand-azure-role-based-access-control-rbac/
Understand Azure Role Based Access Control (RBAC)
Hi Folks! As I said weeks ago, I am studying to take Az-104 exam and I intend to detail here some of the topics that will be covered by the exam. For that reason today I decided to talk about RBACs…
getpractical.co.uk
https://learn.microsoft.com/ko-kr/azure/role-based-access-control/overview
Azure RBAC(Azure 역할 기반 액세스 제어)란?
Azure RBAC(Azure 역할 기반 액세스 제어) 개요를 가져옵니다. 역할 할당을 사용하여 Azure 리소스에 대한 액세스를 제어합니다.
learn.microsoft.com
https://learn.microsoft.com/ko-kr/azure/well-architected/service-guides/virtual-network
Azure Virtual Network에 대한 아키텍처 모범 사례 - Microsoft Azure Well-Architected Framework
Azure Well-Architected Framework 디자인 고려 사항 및 Azure Virtual Network 및 지원되는 기능과 관련된 구성 권장 사항에 대해 알아봅니다.
learn.microsoft.com
Network Security Groups with Azure Site Recovery - Azure Site Recovery
Describes how to use Network Security Groups with Azure Site Recovery for disaster recovery and migration
learn.microsoft.com
https://learn.microsoft.com/ko-kr/azure/virtual-network/network-security-group-how-it-works
네트워크 보안 그룹이 Azure에서 네트워크 트래픽을 필터링하는 방법
Azure 네트워크 보안 그룹이 가상 네트워크에서 인바운드 및 아웃바운드 트래픽을 필터링하는 방법을 알아보세요. 보안 Azure 네트워킹에 대한 NSG 규칙, 트래픽 흐름 처리 및 모범 사례를 알아봅니
learn.microsoft.com
https://learn.microsoft.com/ko-kr/security/zero-trust/azure-networking-segmentation
Azure 기반 네트워크 통신 분할에 제로 트러스트 원칙 적용
Azure 기반 네트워크 통신 분할에 제로 트러스트 원칙을 적용하는 방법을 알아봅니다.
learn.microsoft.com
https://learn.microsoft.com/ko-kr/azure/firewall/overview
Azure Firewall이란?
Azure Firewall은 Azure Virtual Network 리소스를 보호하는 관리되는 클라우드 기반 네트워크 보안 서비스입니다.
learn.microsoft.com
M06-단원 7 Azure Portal을 사용하여 Azure Firewall 배포 및 구성 | AZ-700-Designing-and-Impl
microsoftlearning.github.io
Getting Started with Azure Resource Manager for public and internal load balancers in Python - Code Samples
This doc shows how to manage a public load balancer with outbound rules and an internal load balancer using the Azure Resource Manager APIs for Python.
learn.microsoft.com
https://learn.microsoft.com/ko-kr/azure/web-application-firewall/overview
Azure 웹 애플리케이션 방화벽 소개
이 문서에서는 Azure Web Application Firewall 서비스에 대한 개요를 제공합니다.
learn.microsoft.com
https://learn.microsoft.com/en-us/azure/storage/common/storage-redundancy
Data redundancy - Azure Storage
Understand data redundancy in Azure Storage. Data in your Microsoft Azure Storage account is replicated for durability and high availability.
learn.microsoft.com
https://learn.microsoft.com/en-us/azure/vpn-gateway/design?utm_source=chatgpt.com
Azure VPN Gateway topologies and design
Learn about VPN Gateway topologies and designs you can use to connect on-premises locations to virtual networks.
learn.microsoft.com
https://learn.microsoft.com/en-us/azure/sentinel/hunts
Conduct end-to-end threat hunting with Hunts - Microsoft Sentinel
Learn how to use hunts for conducting end-to-end proactive threat hunting. Seek out undetected threats based on hypothesis or start broadly and refine your searches with this hunting experience.
learn.microsoft.com
https://www.stationx.net/what-is-microsoft-security-copilot/
What is Microsoft Security Copilot? A Comprehensive Guide
Use this comprehensive Microsoft Security Copilot guide to answer what Security Copilot is and how it will revolutionize cyber security as we know it today.
www.stationx.net
Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI - The Official Microsoft Blog
The odds are against today’s defenders Today the odds remain stacked against cybersecurity professionals. Too often, they fight an asymmetric battle against prolific, relentless and sophisticated attackers. To protect their organizations, defenders must
blogs.microsoft.com