Emad Adel Hanna

I am a Cloud Solution Architect

Emad Adel

With over 15 years of experience in IT, I am a seasoned cloud solution architect and a Microsoft Certified Trainer. I currently work at KlayyTech, a leading IT company that provides cloud services and solutions to clients across various industries.
Erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper.

  • Cairo, Egypt
  • +20-12-4892008, +20-016-3008167
  • me@emadadel.com
  • it.emadadel@hotmail.com
  • www.emadadel.com
Me

My Professional Skills

I have successfully led numerous cloud migration projects, ensuring a smooth transition from on-premises to cloud-based environments. I also have expertise in cloud security and compliance, ensuring data protection and regulatory adherence. .

Microsoft Azure 90%
Microsoft 365 95%
Amazon AWS 70%
Enterprise Architect 60%

Training Services

I give people practical skills and knowledge for the workplace. It can help and improving their skills (Azure ,AWS , Microsoft 365 and SharePoint ).

IT consultant services

Helping businesses use technology to achieve their goals. and offer expertise in areas like cloud computing, cybersecurity, and software selection, and can improve efficiency, reduce risk, and save costs..

Professional Services

As and Azure expert and microsoft 365, I provide the best services, support and advice for all things Microsoft (Microsoft migration, support, and optimisation services).

Enterprise Architect services

help organizations align their IT infrastructure with business strategy. They basically design, evaluate, and build a blueprint for how technology supports the company's goals..

0
Completed project
0
Certifications Award
0
Success Training and Sessions
Completed Consultant projects
  • Important Update: Azure Automation Update Management and Log Analytics Agent Retirement

    Important Update: Azure Automation Update Management and Log Analytics Agent Retirement

     



    Attention Azure users!

    This is a critical notice regarding the retirement of two key services: Azure Automation Update Management and the Log Analytics agent.

    Both will be discontinued on August 31, 2024.

    To ensure uninterrupted update management for your virtual machines, migrating to Azure Update Manager is essential before the retirement date.

     

    Why the Change?

    Microsoft is streamlining its update management offerings by focusing on Azure Update Manager, a robust solution with several advantages. These include:

    • Simplified onboarding: Azure Update Manager leverages existing Azure features for effortless integration.
    • Enhanced control: Granular access controls allow for precise management of update deployment.
    • Flexible automation: Automatic patching capabilities streamline the update process.
    •  

    Taking Action: Migrate to Azure Update Manager

    To avoid disruptions after August 31st, migrating to Azure Update Manager is necessary. Microsoft provides a comprehensive guide to facilitate this transition:

     

    Move from Automation Update Management to Azure Update Manager

    https://learn.microsoft.com/en-us/azure/automation/update-management/overview

    This guide details the migration process, ensuring a smooth transfer to the new platform.

     

    Don't wait! Begin the migration process today to ensure your virtual machines receive updates seamlessly after the retirement of Azure Automation Update Management and the Log Analytics agent.


    See more 

  • Azure Arc: Manage Your Hybrid & Multi-Cloud Like a Boss

    Azure Arc: Manage Your Hybrid & Multi-Cloud Like a Boss

    Azure Arc simplifies managing your entire IT infrastructure, unifying control over resources across:

    • Azure Cloud: Native Azure services like VMs, databases, and containers.
    • On-premises Datacenters: Physical and virtual machines running Windows, Linux, or Kubernetes.
    • Other Clouds: Public cloud environments from other providers like AWS or GCP.

    Key Benefits:

    • Unified View: Gain a central dashboard for all your resources, regardless of location.
    • Simplified Management: Use familiar Azure tools and policies for consistent management across environments.
    • Enhanced Security: Enforce centralized security policies and access controls.
    • Reduced Costs: Optimize resource utilization and streamline operations.

    Who Should Use Azure Arc?

    • IT professionals managing hybrid or multi-cloud environments.
    • DevOps teams seeking consistent infrastructure management for deployments.
    • Anyone wanting to simplify and centralize their IT infrastructure.


    Getting Started with Azure Arc is Easy:

    1. Onboard Resources: Register your on-premises and other cloud resources with Azure Arc.
    2. Consolidate Management: Use Azure tools and services to manage all your resources from a single pane of glass.
    3. Automate and Secure: Implement policies and automation for consistent configuration and enhanced security.

    You can check out my YouTube video on Azure Arc Overview Part 1| Arabic بالعربي server here: https://youtube.com/shorts/8JXkUIjm-0s

    Azure Arc empowers you to embrace a hybrid and multi-cloud future with confidence. Take control, simplify management, and optimize your IT infrastructure today! 

  • Continuous Access Evaluation with Microsoft Entra


    Continuous Access Evaluation (CAE) is a security feature in Microsoft Entra that enhances the resilience and security of cloud applications. It allows for the immediate revocation of access tokens if there's a change in user account status or tenant policy, without waiting for token expiration. Here are the key points about CAE:

    Real-Time Policy Enforcement: CAE enables near real-time enforcement of user termination, password changes, and network location changes through critical event evaluation.

    Supported Services: Initially, CAE is implemented for services like Exchange Online, SharePoint Online, and Teams.

    Token Lifetime: Increases token lifetime up to 28 hours, but with the capability to revoke tokens instantly based on policy evaluation or critical events.
    Preparation: To prepare applications for CAE, developers should refer to the guide on using CAE-enabled APIs.

    For a detailed understanding of how to implement and benefit from CAE with Microsoft Entra, you can explore the official documentation.



  • On Premise vs Public Cloud vs Private Cloud vs multi-cloud : Which One Is Best and Why?

     


    The cloud revolution has transformed how businesses store and access data. But with various deployment models available, choosing the right option can be overwhelming. Let's explore the key differences between on-premise, public cloud, private cloud, and multi-cloud solutions.

    • On-Premise:  Imagine your own data center. You have complete control over hardware, software, and security, ideal for highly sensitive data. However, the upfront costs for infrastructure and IT staff are significant, and scalability is limited.


    • Public Cloud: Think shared office space. You rent resources from providers like Amazon Web Services (AWS) or Microsoft Azure. This offers low upfront costs, high scalability, and easy management. However, customization is limited, and security requires a shared responsibility model.


    Private Cloud: This is like having a dedicated floor in a high-rise. You have a cloud environment built just for your organization, either on-premise or managed by a provider. It offers a high degree of control and customization, along with better scalability than on-premise. However, there are still ongoing fees and some IT expertise is needed.


    • Multi-Cloud: Imagine working from multiple co-working spaces. This approach combines resources from various public clouds and potentially private clouds. It offers increased flexibility, redundancy, and potentially lower costs by leveraging provider strengths. But managing multiple cloud environments can be complex, and vendor lock-in for specific services remains a concern.



    Feature

    On-Premise

    Public Cloud

    Private Cloud

    Multi-Cloud

    Location

    On-site

    Shared infrastructure

    Dedicated infrastructure

    Multiple locations

    Control & Customization

    Highest

    Limited

    High (with some shared)

    Varies

    Cost (Upfront)

    High

    Low

    Lower

    Varies

    Scalability

    Low

    High

    High (depends on setup)

    High

    Security

    Managed by you

    Shared responsibility

    High control

    Requires careful mgmt

    Pros

    Maximum control, security

    Cost-effective, scalable

    Control, customization

    Flexibility, redundancy

    Cons

    High cost, limited scale

    Limited control, vendor lock-in

    More expensive than public

    Increased complexity




    Choosing the right cloud model depends on your specific needs. Consider factors like security requirements, budget, IT expertise, and desired control and scalability. By understanding the pros and cons of each option, you can make an informed decision that empowers your business in the cloud era.

  • Microsoft Copilot For Security Community

     

    What is Microsoft Copilot for Security?



    Microsoft Copilot for Security (Copilot for Security) is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale.

    Copilot for Security provides a natural language, assistive copilot experience. Copilot for Security helps support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management.

    The official Copilot for Security GitHub Community was just released by the team! Lots and lots of guidelines, logic applications, seminars, examples, and prompting materials. 

    Microsoft Copilot for Security is a generative AI-powered assistant for daily operations in security and IT that empowers teams to protect at the speed and scale of AI.


    🔥 The URL is lnkd.in/epnqccq8.

  • What is The Azure Monitor Agent (AMA) ?

    The Azure Monitor Agent (AMA) is a tool that collects monitoring data from the guest operating system of Azure and hybrid virtual machines. It then delivers this data to Azure Monitor, which can be used by various features, insights, and other services like Microsoft Sentinel and Microsoft Defender for Cloud¹. 
    AMA is designed to replace all of Azure Monitor's legacy monitoring agents. It offers several benefits, including cost savings through targeted data collection rules, simpler management, and enhanced security with Managed Identity and Microsoft Entra tokens¹. 

    It's important to note that the Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. Therefore, if you're using the Log Analytics agent, you should migrate to the new Azure Monitor agent before that date¹.

  • User Consent Settings in Microsoft 365

    User Consent Settings in Microsoft 365

    When it comes to applications that request access to your organization's data, managing user consent is crucial. Here's how you can configure and control user consent settings:

    1. **Default Behavior**:
       - By default, all users are allowed to consent to applications for permissions that don't require administrator approval.
       - However, to reduce the risk of malicious apps gaining access to your organization's data, consider allowing user consent only for applications published by verified publishers.

    2. **Configuring User Consent**:
       - Sign in to the **Microsoft Entra admin center** as a **Global Administrator**.
       - Navigate to **Identity > Applications > Enterprise applications > Consent and permissions > User consent settings**.
       - Choose the consent setting you want to configure for all users (e.g., allow or restrict user consent).
       - Save your settings.

    3. **Admin Approval Workflow**:
       - If you disable user consent, admins must consent to apps before users can use them.
       - Set up an **admin consent workflow** in the Microsoft Entra admin center so users can request admin approval for blocked apps.

    Remember that users can grant access only to apps they own, and they can't give an app access to other users' information.