Contact

Feel free to reach out to me using these channels:

Mailmok @ mortenknudsen.net
Business mail / Microsoft Teams IMmok @ 2linkit.net
Twitter@knudsenmortendk
LinkedInhttps://www.linkedin.com/in/mortenwaltorpknudsen/

Headline

Cloud & Security Architect, blogger on mortenknudsen.net and speaking at events.

Biography

Highly experienced Azure & Microsoft 365 Security specialist, who have been been in the IT-industry since 1991 working with Microsoft-technologies since 1994.

I work as a freelance consultant with focus on Azure, Microsoft 365 cloud and security technologies. My roles are primarily technical advisory, design and implementation for customers, but secondly I am also helping my customers with the needed processes and getting their management and it-organization to support and adopt cloud – including operating model, cost management, reporting and governance.

My areas of technical specialization are Azure infrastructure, Microsoft Defender platform, Microsoft Sentinel, Microsoft LogAnalytics, Microsoft Workbooks, Azure Arc, Azure Resource Graph, Azure Extensions, Azure Monitor and scripting.

I have also built an entire reporting framework with +35 dashboards bringing 20 Microsoft technologies together in a holistic view focusing on showing a desired-state and tracking security-deviations, operational-issues and cost-changes.

I love to travel with my family and visit new places in the world to understand how life is there; how people live; try to taste what they eat; understand their challenges, etc.

Our vacations are often ‘action-related’ covering activities life diving including shark-diving, skiing, ziplining, river-rafting, balloons, safari, watch F1, luges, bike riding, etc.

I love to dive and am a PADI Dive Master and PADI Master Scuba Diver.

What I do? | Technology enabling

Design & Implementation of Azure landing zone structure for enterprise-scale setupMicrosoft Cloud Adoption Framework (CAF)
Implementation of Azure policies – based on MS CAFAzure Policy
Implementation of Azure delegation structure (using AD and/or AAD cloud groups)AD/AAD Roles
Implementation of Entra Identity ManagementEntra ID
Entra Self-service Password
Entra MFA
Entra Identity Protection
Entra Connect
Entra Conditional Access
Entra Identity Governance
Entra Access Reviews
Entra Privilege Identity Management (PIM)
Automation of Azure resource provisioningAzure
Powershell
Design & Implementation of hub-environments for connectivity in enterprise scale setupAzure Virtual Wan
Azure S2S VPN
Azure ExpressRoute
Azure Firewall
Cisco Meraki
Cisco FTD NVA
Palo Alto NVA
CheckPoint NVA
FortiGate NVA
Automation of Azure Arc for on-premise serversAzure Arc
Automatic download and update of Azure Arc agents on existing clients, structured in dev/test/prodAzure Arc
Automatic management of existing Azure Arc implementation (with automatic mitigation of issues)Azure Arc
Design & Implementation of Data Collection Rules for Collection of Event logsAzure Monitor
Design & Implementation of Data Collection Rules for Collection of Performance & ServiceMap dataAzure Monitor
Design & Implementation of Data Collection Rules for Collection of Syslog & CEF dataAzure Monitor
Design & Automation of Azure Extensions implementation & managementAzure Extensions
Design & Implementation of patch managementAzure Update Management Center
Azure Automation Update Management
Design & Implementation of Microsoft SentinelMicrosoft Sentinel
Automation of Sentinel alert rules managementMicrosoft Sentinel
Implementation of Azure Workbooks & Dashboards for operation / security / cost overviewAzure Workbooks
Azure Dashboards
Design & Implementation of Microsoft Defender for CloudMicrosoft Defender for Cloud (MDC)
Design & Implementation of Microsoft Defender for IdentityMicrosoft Defender for Identity (MDI)
Design & Implementation of Microsoft Defender for Office 365Microsoft Defender for Office 365 (MDO)
Design & Implementation of Microsoft Defender for ApplicationsMicrosoft Defender for Application (MCAS)
Design & Implementation of Microsoft External Attack Surface ManagementMicrosoft Defender External Attack Surface Management (EASM)
Design & Implementation of Microsoft Defender for EndpointMicrosoft Defender for Endpoint (MDE)
Migration to / Implementation of Microsoft Defender AntivirusWindows Defender Antivirus
Implementation of Microsoft Secure Score baseline recommendationsM365 Defender suite
Implementation of Azure cost managementAzure cost management

What I do ? | Processes & Organizational projects

Advisory on working with security recommendations
(processes & org – who, when, what, how)
Microsoft Defender for Cloud
Microsoft Secure Score
Advisory on establishment of KPIs & dashboards
(who, when, how, what, governance, change management)
Azure | M365
Advisory on cost management structure (automation, reporting, notifications)Azure
Advisory on cloud structure & roles including skills mappingAzure | M365
Advisory on cloud adoption (people motivation, goals)Azure | M365