Cloud Coverage™ Library

Quality Content You Can Trust

Latest news and technical articles related to cloud computing with Windows Server 2016. Argon has carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Windows Server 2016 NTFS sparse file/Data Deduplication users: please install KB4025334

Hi folks, KB4025334 prevents a critical data corruption issue with NTFS sparse files in Windows Server 2016. This helps avoid data corruptions that may occur when using Data Deduplication in Windows Server 2016, although all applications and Windows components that ... continue reading

TLS 1.2 Support added to Windows Server 2008

This post is authored by Arden White, Senior Program Manager, Windows Servicing and Delivery. As a follow-up to our announcement regarding TLS 1.2 support at Microsoft we are announcing that support for TLS1.1/TLS 1.2 on Windows Server 2008 is now ... continue reading

Demo: Identify and fix plan change regression in SQL Server 2017 RC1

Plan change regression happens when SQL Database changes a plan for some T-SQL query, and the new plan has the worse performance than the previous one. SQL Server 2017 has Automatic Tuning feature that enables you to easily find plan ... continue reading

Bing Map v8 available in Azure IoT Suite Remote Monitoring preconfigured solution

Azure IoT Suite is designed to get customers and partners started quickly to connect and manage their devices in a simple and reliable manner, realizing business value from an IoT solution. Bing Map (v7) has been integrated as part of ... continue reading

Introducing the Azure Analysis Services web designer

Today we are releasing a preview of the Azure Analysis Services web designer. This new browser-based experience will allow developers to start creating and managing Azure Analysis Services (AAS) semantic models quickly and easily. While SQL Server Data Tools (SSDT) ... continue reading

Introducing Enterprise Smart Contracts

Introduction Enterprise Smart Contracts - Full Whitepaper It has been a little over a year since we announced Project Bletchley, and since that time we have been working directly with our partners and customers to understand how the cloud can ... continue reading

Getting Started with Microsoft #Azure Cloud #Security Center

Microsoft Azure Security With Microsoft Azure Cloud Services you can make a lot of resources using for your Business. Think about Storage, Compute, Databases, Networks and applications. Microsoft Azure Security is there to keep your resources and data as save ... continue reading

Accelerate websites with Azure CDN using Dynamic Site Acceleration

Users expect fast, reliable, and personalized web experiences independent of their browser, location, device, or network. However, the very innovations, such as rich interactive content and applications, that make these experiences so engaging also slow page downloads and put the ... continue reading

How Azure Security Center helps protect your servers with Web Application Firewall

Our adversaries have many tools available on the Internet for use in mounting cyberattacks. Many of these tools enable them to gain access and control of enterprise IT resources. In the meantime, security professionals are not always aware of the ... continue reading

Build custom video AI workflows with Video Indexer and Logic Apps

With the Video Indexer connector for Logic Apps, you can now set up custom workflows connecting your most used apps with Video Indexer to further automate the process of extracting deep insights from your videos. In this blog, I will ... continue reading

Artificial Intelligence tunes Azure SQL Databases

Automatic tuning To stay competitive, today’s businesses need to make sure that they focus on their core competencies that directly deliver customer value while relying on their cloud provider to offer an affordable, reliable, and easy to use computing infrastructure ... continue reading

Viewing Memory in PowerShell

Hello there, this is Benjamin Morgan, and I’m a Premier Field Engineer covering Active Directory and Platforms related topics. This is my first blog post I hope you are all as excited about this as I am! Today I wanted ... continue reading

(Part 1) Microsoft Operations Management Suite – Windows Server 2016

In this first part in a three part video series we provide an overview of Microsoft's cloud delivered management system Operations Management Suite (OMS). OMS was developed by Microsoft as a comprehensive management suite for managing all of your server ... continue reading

Copying Files into a Hyper-V VM with Vagrant

A couple of weeks ago, I published a blog with tips and tricks for getting started with Vagrant on Hyper-V. My fifth tip was to “Enable Nifty Hyper-V Features,” where I briefly mentioned stuff like differencing disks and virtualization extensions ... continue reading

How to: Resize virtual machines in #Azure With #Powershell Multiple or Single virtual machines

With the new VM sizes in Azure you may want to change the Size as you get more VM for less money. but remember the VM will restart! so better fi But changing the VM by hand is a time ... continue reading

Monitoring automatic tuning actions using XEvents

SQL Server 2017 can automatically tune your queries by identifying and fixing SQL plan change regressions. SQL Server tracks last known good plans for each query, and if the plan for the query changes, last know good plan will be ... continue reading

SQL Server 2017 containers for DevOps scenarios

This post was authored by Tony Petrossian, Partner Group Program Manager, Database Systems Group SQL Server 2017 will bring with it support for the Linux OS and containers running on Windows, Linux, and macOS. Our goal is to enable SQL ... continue reading

HTTPS Client Certificate Request freezes when the Server is handling a large PUT/POST Request

HTTPS Client Certificate Request freezes when the Server is handling a large PUT/POST Request There is a class of problems that may occur when using client-side certificates in HTTPS. Sometimes, the server’s request for a client certificate will freeze (until ... continue reading

Storage Spaces Direct on Intel® Xeon® Scalable Processors

Hello, Claus here again. As you have probably noticed by now, we have a great ongoing collaboration with Intel. In this blog post we are going to look at Windows Server 2016 Storage Spaces Direct on Intel’s latest and greatest ... continue reading

Built-In Administrator Account Lockout

Hello, my name is Jason Krause and this is my first time writing a blog post for AskPFEPlat. I am a Platforms PFE here at Microsoft and work primarily in Active Directory and Group Policy. Recently a customer approached me ... continue reading

Protecting Windows Server 2016 using Azure Backup

The IT industry is excited about the general availability of Windows Server 2016 with enhancements to Active Directory, Hyper-V failover clustering, remote desktop services, and file and storage services. Windows Server 2016 is being widely run on physical as well ... continue reading

KB: Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2

We have released a new KB article Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2 which contains a solution to the following issue: Client-related operations fail in an installation ... continue reading

KB: Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2

We have released a new KB article Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2 which contains a solution to the following issue: Client-related operations fail in an installation ... continue reading

Analyze your Check Point logs with OMS Security

The Security & Compliance solution in the Operations Management Suite (OMS) provides security insights about many sources of security data from Windows and Linux machines, including any source that emits Syslog. Today, we are announcing a new capability, developed by ... continue reading

Learning to Use Vagrant: Tips and Tricks with Vagrant and Hyper-V

A few months ago, I went to DockerCon as a Microsoft representative. While I was there, I had the chance to ask developers about their favorite tools. The most common tool mentioned (outside of Docker itself) was Vagrant. This was ... continue reading

Monitoring Large DPM Deployments with SCOM

DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. One way to monitor the DPM servers centrally is using SCOM. In this blog, our guest, John Joyner, talks about leveraging Central Console ... continue reading

Latin America is stepping up to the plate in cybersecurity policy

A year ago Inter-American Development Bank (IDB) and the Organization of American States (OAS) asked themselves a question about cybersecurity: “Are We Ready in Latin America and the Caribbean?”. The conclusion of their 200 page report was essentially “No”, raising ... continue reading

Tracking configuration changes for your Azure VM

In this blog post, I will talk about how to use the Change Tracking solution to detect in-guest changes on your Azure VMs. Right from within your Azure VM you can quickly assess details of changes that occurred across your ... continue reading

Mesosphere DCOS, Azure, Docker, VMware & Everything Between – SSH Authorized Keys

After clearing out all the security-related tweaks, configurations, and having all of our DC/OS cluster nodes installed with the Docker engine. We will dive into part 3 for this series, when it’s time to create the SSH authorized keys file ... continue reading

How Azure Security Center detects DDoS attack using cyber threat intelligence

Azure Security Center automatically collects, analyzes, and integrates log data from a variety of Azure resources. A list of prioritized security alerts are shown in Security Center along with the information you need to quickly investigate the problem along with ... continue reading
Loading...