Emad Adel Hanna

I am a Cloud Solution Architect

Emad Adel

With over 15 years of experience in IT, I am a seasoned cloud solution architect and a Microsoft Certified Trainer. I currently work at KlayyTech, a leading IT company that provides cloud services and solutions to clients across various industries.
Erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper.

  • Cairo, Egypt
  • +20-12-4892008, +20-016-3008167
  • me@emadadel.com
  • it.emadadel@hotmail.com
  • www.emadadel.com
Me

My Professional Skills

I have successfully led numerous cloud migration projects, ensuring a smooth transition from on-premises to cloud-based environments. I also have expertise in cloud security and compliance, ensuring data protection and regulatory adherence. .

Microsoft Azure 90%
Microsoft 365 95%
Amazon AWS 70%
Enterprise Architect 60%

Training Services

I give people practical skills and knowledge for the workplace. It can help and improving their skills (Azure ,AWS , Microsoft 365 and SharePoint ).

IT consultant services

Helping businesses use technology to achieve their goals. and offer expertise in areas like cloud computing, cybersecurity, and software selection, and can improve efficiency, reduce risk, and save costs..

Professional Services

As and Azure expert and microsoft 365, I provide the best services, support and advice for all things Microsoft (Microsoft migration, support, and optimisation services).

Enterprise Architect services

help organizations align their IT infrastructure with business strategy. They basically design, evaluate, and build a blueprint for how technology supports the company's goals..

0
Completed project
0
Certifications Award
0
Success Training and Sessions
Completed Consultant projects
  • Make Network Path Visible For SQL Server Backup and Restore in SSMS

     

    Make Network Path Visible For SQL Server Backup and Restore in SSMS



    There are two main approaches to make a network path visible for SQL Server backup and restore operations in SSMS:

    1. Using UNC Path:

    This is the recommended approach and avoids complications with drive mappings. Simply specify the full Universal Naming Convention (UNC) path to the network location in your backup or restore statements.

    Here's an example:

    SQL
    BACKUP DATABASE MyDatabase TO DISK = N'\\Servername\ShareName\MyDatabaseBackup.bak'
    

    2. Mapping Network Drive (with caution):

    If you prefer using a drive letter, you can map the network drive. However, keep in mind that the SQL Server service account needs access to the mapped drive. Here's what to consider:

    • Map the drive permanently: Use the net use command with the /PERSISTENT:YES flag to ensure the drive remains mapped even after a reboot.

    OR

    • Use xp_cmdshell (with caution):

    This method involves enabling the xp_cmdshell extended stored procedure, which can be a security risk if not handled carefully. Only use this approach if necessary and follow these steps:

    1. Enable xp_cmdshell (with caution):
    SQL
    EXEC sp_configure 'show advanced options', 1;
    GO
    RECONFIGURE;
    GO
    EXEC sp_configure 'xp_cmdshell',1
    GO
    RECONFIGURE
    GO
    
    1. Map the drive using xp_cmdshell:
    SQL
    EXEC xp_cmdshell 'net use H: \\Servername\ShareName /USER:Domain\Username'
    

    Replace:

    • H: with your desired drive letter.
    • \\Servername\ShareName with the actual network path.
    • Domain\Username with the credentials that have access to the share (if necessary).
    1. Verify the mapping:
    SQL
    EXEC xp_cmdshell 'Dir H:'
    
    1. Use the mapped drive letter in your backup or restore statements (e.g., H:\MyDatabaseBackup.bak).

    2. Remember to disable xp_cmdshell after use for security reasons:

    SQL
    EXEC sp_configure 'xp_cmdshell', 0
    GO
    RECONFIGURE
    GO
    

    Important points:

    • Mapping a drive might not work if the SQL Server service account doesn't have access to the share.
    • Using xp_cmdshell carries security risks. Enable it only when necessary and disable it afterward.

    Recommendation:

    For better security and consistency, it's generally recommended to use the UNC path directly in your backup and restore statements.


  • Important Update: Azure Automation Update Management and Log Analytics Agent Retirement

    Important Update: Azure Automation Update Management and Log Analytics Agent Retirement

     



    Attention Azure users!

    This is a critical notice regarding the retirement of two key services: Azure Automation Update Management and the Log Analytics agent.

    Both will be discontinued on August 31, 2024.

    To ensure uninterrupted update management for your virtual machines, migrating to Azure Update Manager is essential before the retirement date.

     

    Why the Change?

    Microsoft is streamlining its update management offerings by focusing on Azure Update Manager, a robust solution with several advantages. These include:

    • Simplified onboarding: Azure Update Manager leverages existing Azure features for effortless integration.
    • Enhanced control: Granular access controls allow for precise management of update deployment.
    • Flexible automation: Automatic patching capabilities streamline the update process.
    •  

    Taking Action: Migrate to Azure Update Manager

    To avoid disruptions after August 31st, migrating to Azure Update Manager is necessary. Microsoft provides a comprehensive guide to facilitate this transition:

     

    Move from Automation Update Management to Azure Update Manager

    https://learn.microsoft.com/en-us/azure/automation/update-management/overview

    This guide details the migration process, ensuring a smooth transfer to the new platform.

     

    Don't wait! Begin the migration process today to ensure your virtual machines receive updates seamlessly after the retirement of Azure Automation Update Management and the Log Analytics agent.


    See more 

  • Azure Arc: Manage Your Hybrid & Multi-Cloud Like a Boss

    Azure Arc: Manage Your Hybrid & Multi-Cloud Like a Boss

    Azure Arc simplifies managing your entire IT infrastructure, unifying control over resources across:

    • Azure Cloud: Native Azure services like VMs, databases, and containers.
    • On-premises Datacenters: Physical and virtual machines running Windows, Linux, or Kubernetes.
    • Other Clouds: Public cloud environments from other providers like AWS or GCP.

    Key Benefits:

    • Unified View: Gain a central dashboard for all your resources, regardless of location.
    • Simplified Management: Use familiar Azure tools and policies for consistent management across environments.
    • Enhanced Security: Enforce centralized security policies and access controls.
    • Reduced Costs: Optimize resource utilization and streamline operations.

    Who Should Use Azure Arc?

    • IT professionals managing hybrid or multi-cloud environments.
    • DevOps teams seeking consistent infrastructure management for deployments.
    • Anyone wanting to simplify and centralize their IT infrastructure.


    Getting Started with Azure Arc is Easy:

    1. Onboard Resources: Register your on-premises and other cloud resources with Azure Arc.
    2. Consolidate Management: Use Azure tools and services to manage all your resources from a single pane of glass.
    3. Automate and Secure: Implement policies and automation for consistent configuration and enhanced security.

    You can check out my YouTube video on Azure Arc Overview Part 1| Arabic بالعربي server here: https://youtube.com/shorts/8JXkUIjm-0s

    Azure Arc empowers you to embrace a hybrid and multi-cloud future with confidence. Take control, simplify management, and optimize your IT infrastructure today! 

  • Continuous Access Evaluation with Microsoft Entra


    Continuous Access Evaluation (CAE) is a security feature in Microsoft Entra that enhances the resilience and security of cloud applications. It allows for the immediate revocation of access tokens if there's a change in user account status or tenant policy, without waiting for token expiration. Here are the key points about CAE:

    Real-Time Policy Enforcement: CAE enables near real-time enforcement of user termination, password changes, and network location changes through critical event evaluation.

    Supported Services: Initially, CAE is implemented for services like Exchange Online, SharePoint Online, and Teams.

    Token Lifetime: Increases token lifetime up to 28 hours, but with the capability to revoke tokens instantly based on policy evaluation or critical events.
    Preparation: To prepare applications for CAE, developers should refer to the guide on using CAE-enabled APIs.

    For a detailed understanding of how to implement and benefit from CAE with Microsoft Entra, you can explore the official documentation.



  • On Premise vs Public Cloud vs Private Cloud vs multi-cloud : Which One Is Best and Why?

     


    The cloud revolution has transformed how businesses store and access data. But with various deployment models available, choosing the right option can be overwhelming. Let's explore the key differences between on-premise, public cloud, private cloud, and multi-cloud solutions.

    • On-Premise:  Imagine your own data center. You have complete control over hardware, software, and security, ideal for highly sensitive data. However, the upfront costs for infrastructure and IT staff are significant, and scalability is limited.


    • Public Cloud: Think shared office space. You rent resources from providers like Amazon Web Services (AWS) or Microsoft Azure. This offers low upfront costs, high scalability, and easy management. However, customization is limited, and security requires a shared responsibility model.


    Private Cloud: This is like having a dedicated floor in a high-rise. You have a cloud environment built just for your organization, either on-premise or managed by a provider. It offers a high degree of control and customization, along with better scalability than on-premise. However, there are still ongoing fees and some IT expertise is needed.


    • Multi-Cloud: Imagine working from multiple co-working spaces. This approach combines resources from various public clouds and potentially private clouds. It offers increased flexibility, redundancy, and potentially lower costs by leveraging provider strengths. But managing multiple cloud environments can be complex, and vendor lock-in for specific services remains a concern.



    Feature

    On-Premise

    Public Cloud

    Private Cloud

    Multi-Cloud

    Location

    On-site

    Shared infrastructure

    Dedicated infrastructure

    Multiple locations

    Control & Customization

    Highest

    Limited

    High (with some shared)

    Varies

    Cost (Upfront)

    High

    Low

    Lower

    Varies

    Scalability

    Low

    High

    High (depends on setup)

    High

    Security

    Managed by you

    Shared responsibility

    High control

    Requires careful mgmt

    Pros

    Maximum control, security

    Cost-effective, scalable

    Control, customization

    Flexibility, redundancy

    Cons

    High cost, limited scale

    Limited control, vendor lock-in

    More expensive than public

    Increased complexity




    Choosing the right cloud model depends on your specific needs. Consider factors like security requirements, budget, IT expertise, and desired control and scalability. By understanding the pros and cons of each option, you can make an informed decision that empowers your business in the cloud era.

  • Microsoft Copilot For Security Community

     

    What is Microsoft Copilot for Security?



    Microsoft Copilot for Security (Copilot for Security) is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale.

    Copilot for Security provides a natural language, assistive copilot experience. Copilot for Security helps support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management.

    The official Copilot for Security GitHub Community was just released by the team! Lots and lots of guidelines, logic applications, seminars, examples, and prompting materials. 

    Microsoft Copilot for Security is a generative AI-powered assistant for daily operations in security and IT that empowers teams to protect at the speed and scale of AI.


    🔥 The URL is lnkd.in/epnqccq8.