Hi, remove public access to VMs and only access them via Azure Bastion or a private jump host with Just-In-Time on 22/3389; on Linux use SSH only with a key (Ed25519), disable password and root (no PasswordAuthentication, no PermitRootLogin, few MaxAuthTries), on Windows RDP with NLA; enable Enter ID login for Windows/Linux to apply MFA and Conditional Access; close everything in NSG and only allow the minimum, if possible put an Azure Firewall in front with egress “deny by default”; no shared accounts: use PIM for JIT admins and LAPS for local admins; update and apply CIS baselines, encrypt disks, backup keys; enable Defender for Servers/EDR, send logs (Sysmon/auditd/NSG flow) to Sentinel with alerts on failed logins/escalations/new ports; keep a single, super-protected cloud-only “break-glass” account; Avoid "miracle" tools that insert drivers/hooks into the kernel: they often break and blind the EDR. If you tell me what the situation is today (Bastion yes/no, NSG, Entra)
Want to make your accounts more secure?
For Linux and Windows server, if you want to make remote login accounts on them more secure, use ssh server on them, disable all other remote login services, our solution can make them well protected.
And for Linux, our security software can beat any other vendors' security solution make it more secure. as when you run our security commands, they alll will make the whole system more secure, as it will detect and kill not only the strace/debuggers that are used for only targets one process, but also those targeting multiple processes ones: dtrace, systemtap, bcc, bpftrace, uprobe, kprobe, memory snoopers that read from the /dev/[k]mem, /proc/kcore. And when you use our gencert/secrun commands to run 3rd party commands, it can prevent software-based attacks to the 3rd party commands, including Trojan Horse attacks.