Continuous Integration and Deployment for Docker Workloads on Azure Container Service

In 2016, host based firewalls are not optional in a Cybersecurity strategy. Windows comes with a built in and powerful firewall, however the Windows Firewall has a reputation for being difficult to troubleshoot and manage, which leads to it being turned off in most organizations and not well understood. We'll walk through the ins and outs of the Windows Firewall, the attacks it prevents, strategies for managing firewall profiles in complex enterprise environments, planning a rollout that doesn't break everything and troubleshooting when everything does break. We'll also dive into the misunderstood magic of IPsec, showcasing the capabilities available to your customer (identify based firewall rules!) if they embrace the Windows solution, how to unravel the mysteries of “why is my IPsec negotiation failing?” and when and when not to use IPsec.