Feel free to reach out to me using these channels:
|mok @ mortenknudsen.net|
|Business mail / Microsoft Teams IM||mok @ 2linkit.net|
Cloud & Security Architect, blogger on mortenknudsen.net and speaking at events.
Top-contributor in Cloud Security Customer Connection Program and Microsoft 365 Defender Customer Connection Program.
Highly experienced Azure & Microsoft 365 Security specialist, who have been been in the IT-industry since 1991 working with Microsoft-technologies since 1994.
I work as a freelance consultant with focus on Azure, Microsoft 365 cloud and security technologies. My roles are primarily technical advisory, design and implementation for customers, but secondly I am also helping my customers with the needed processes and getting their management and it-organization to support and adopt cloud – including operating model, cost management, reporting and governance.
My areas of technical specialization are Azure infrastructure, Microsoft Defender platform, Microsoft Sentinel, Microsoft LogAnalytics, Microsoft Workbooks, Azure Arc, Azure Resource Graph, Azure Extensions, Azure Monitor and scripting.
I have also built an entire reporting framework with +35 dashboards bringing 20 Microsoft technologies together in a holistic view focusing on showing a desired-state and tracking security-deviations, operational-issues and cost-changes.
I love to travel with my family and visit new places in the world to understand how life is there; how people live; try to taste what they eat; understand their challenges, etc.
Our vacations are often ‘action-related’ covering activities life diving including shark-diving, skiing, ziplining, river-rafting, balloons, safari, watch F1, luges, bike riding, etc.
I love to dive and am a PADI Dive Master and PADI Master Scuba Diver.
What I do? | Technology enabling
|Design & Implementation of Azure landing zone structure for enterprise-scale setup||Microsoft Cloud Adoption Framework (CAF)|
|Implementation of Azure policies – based on MS CAF||Azure Policy|
|Implementation of Azure delegation structure (using AD and/or AAD cloud groups)||AD/AAD Roles|
|Implementation of Azure AD Identity Management||Azure AD|
Azure AD Self-service Password
Azure AD MFA
Azure AD Identity Protection
Azure AD Connect
Azure AD Conditional Access
Azure AD Identity Governance
Azure AD Access Reviews
Azure AD Privilege Identity Management (PIM)
|Automation of Azure resource provisioning||Azure|
|Design & Implementation of hub-environments for connectivity in enterprise scale setup||Azure Virtual Wan|
Azure S2S VPN
Cisco FTD NVA
Palo Alto NVA
|Automation of Azure Arc for on-premise servers||Azure Arc|
|Automatic download and update of Azure Arc agents on existing clients, structured in dev/test/prod||Azure Arc|
|Automatic management of existing Azure Arc implementation (with automatic mitigation of issues)||Azure Arc|
|Design & Implementation of Data Collection Rules for Collection of Event logs||Azure Monitor|
|Design & Implementation of Data Collection Rules for Collection of Performance & ServiceMap data||Azure Monitor|
|Design & Implementation of Data Collection Rules for Collection of Syslog & CEF data||Azure Monitor|
|Design & Automation of Azure Extensions implementation & management||Azure Extensions|
|Design & Implementation of patch management||Azure Update Management Center|
Azure Automation Update Management
|Design & Implementation of Microsoft Sentinel||Microsoft Sentinel|
|Automation of Sentinel alert rules management||Microsoft Sentinel|
|Implementation of Azure Workbooks & Dashboards for operation / security / cost overview||Azure Workbooks|
|Design & Implementation of Microsoft Defender for Cloud||Microsoft Defender for Cloud (MDC)|
|Design & Implementation of Microsoft Defender for Identity||Microsoft Defender for Identity (MDI)|
|Design & Implementation of Microsoft Defender for Office 365||Microsoft Defender for Office 365 (MDO)|
|Design & Implementation of Microsoft Defender for Applications||Microsoft Defender for Application (MCAS)|
|Design & Implementation of Microsoft External Attack Surface Management||Microsoft Defender External Attack Surface Management (EASM)|
|Design & Implementation of Microsoft Defender for Endpoint||Microsoft Defender for Endpoint (MDE)|
|Migration to / Implementation of Microsoft Defender Antivirus||Windows Defender Antivirus|
|Implementation of Microsoft Secure Score baseline recommendations||M365 Defender suite|
|Implementation of Azure cost management||Azure cost management|
What I do ? | Processes & Organizational projects
|Advisory on working with security recommendations|
(processes & org – who, when, what, how)
|Microsoft Defender for Cloud|
Microsoft Secure Score
|Advisory on establishment of KPIs & dashboards|
(who, when, how, what, governance, change management)
|Azure | M365|
|Advisory on cost management structure (automation, reporting, notifications)||Azure|
|Advisory on cloud structure & roles including skills mapping||Azure | M365|
|Advisory on cloud adoption (people motivation, goals)||Azure | M365|