Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Zero Trust Assessment tool now live!

With such a large influx of employees working remotely, many of the traditional network-based security controls are unable to protect the organization. For many organizations, there are two options: route all remote traffic through a strained legacy network architecture, resulting ... continue reading
Frequent questions about using Conditional Access to secure remote access

Frequent questions about using Conditional Access to secure remote access

Industry trends and changes in the way we work usually span years, with organizations evolving at their own pace. But we're living in unusual times. Organizations asking employees to work from home to slow the spread of COVID-19 are making ... continue reading

Microsoft Defender ATP can help you secure your remote workforce

As the number of home-based workers has accelerated in the last few weeks, it’s introduced new challenges. You may want to expand the number and types of devices employees can use to access company resources. You need to support a ... continue reading

Go serverless: Serverless operations with Azure DevOps

Abel Wang joins Donovan Brown to show how to use Azure Pipelines to build and deploy apps for Azure Functions, App Service and even Kubernetes Clusters.[0:00:45] - DemoBuild and deploy Java to Azure FunctionsDeploy a Docker container app to Azure ... continue reading
Naveen_Kanneganti_0-1585926100333.png

ConfigMgr Bitlocker Management

Hi Folks! I’m Naveen kanneganti and Welcome to my blogpost. Configmgr has release BitLocker Drive Encryption (BDE) in v1910 for on-premises Windows clients running Windows 10 or Windows 8.1. This feature is optional so, you must enable this feature before ... continue reading

Go serverless: Big data processing with Azure Event Hubs for Apache Kafka

Working with Apache Kafka and want to simplify management of your infrastructure? Lena Hall joins Scott Hanselman to show you can keep using Apache Kafka libraries for hundreds of projects, and try Azure Event Hubs behind the scenes to focus ... continue reading
1_split-tunnel-001.PNG

Mastering Configuration Manager Bandwidth limitations for VPN connected Clients

Hi, Jonas, Roland and Stefan here! We are Microsoft Premier Field Engineers (PFEs) based in Germany focused on Microsoft Endpoint Manager related topics. Due to the current situation we get a lot of questions from our customers around Configuration Manger ... continue reading
Az Update: AZ-104 Beta Exam available, Azure Feedback, Azure Edge Zones and new Disks

Az Update: AZ-104 Beta Exam available, Azure Feedback, Azure Edge Zones and new Disks

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading

Full Operational Shutdown—another cybercrime case from the Microsoft Detection and Response Team

Recently, we published our first case report (001: …And Then There Were Six) by the Microsoft Detection and Response Team (DART). We received significant positive response from our customers and colleagues and our team has been getting inquiries asking for ... continue reading
Image: Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Impact Using Cloud credentials Exec into container Backdoor container Privileged container Clear container logs List K8S secrets Access the K8S API server Access cloud resources Data Destruction Compromised images in registry bash/cmd inside container Writable hostPath mount Cluster-admin binding Delete K8S events Mount service principal Access Kubelet API Container service account Resource Hijacking Kubeconfig file New container Kubernetes CronJob hostPath mount Pod / container name similarity Access container service account Network mapping Cluster internal networking Denial of service Application vulnerability Application exploit (RCE) Access cloud resources Connect from Proxy server Applications credentials in configuration files Access Kubernetes dashboard Applications credentials in configuration files Exposed Dashboard SSH server running inside container Instance Metadata API Writable volume mounts on the host Access Kubernetes dashboard Access tiller endpoint

Attack matrix for Kubernetes

Kubernetes, the most popular container orchestration system and one of the fastest-growing projects in the history of open source, becomes a significant part of many companies’ compute stack. The flexibility and scalability of containers encourage many developers to move their ... continue reading
Zero Trust framework to enable remote work

Zero Trust framework to enable remote work

Zero Trust Assessment tool now live! With such a large influx of employees working remotely, many of the traditional network-based security controls are unable to protect the organization. For many organizations, there are two options: route all remote traffic through ... continue reading
Zero Trust framework to enable remote work

Zero Trust framework to enable remote work

Zero Trust Assessment tool now live! With such a large influx of employees working remotely, many of the traditional network-based security controls are unable to protect the organization. For many organizations, there are two options: route all remote traffic through ... continue reading

PowerShell Basics: How to Upload Files to Azure Storage

In recent days there has been a push to move our team's in-person presentations online. In some cases we've been asked to record our presentations. Storage has quickly become an issue and so I have been investigating ways to transfer ... continue reading
Last1.png

Azure AD pass-through and password hash authentication support for SQL DB, DW and Managed Instance

We are announcing support for Azure AD pass-through and password hash authentication for Azure SQL DB (single database and database pools), Managed Instance, and Azure Synapse (formerly SQL DW). Azure AD password hash authentication is the simplest way to enable ... continue reading

Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

True to form, human-operated ransomware campaigns are always on prowl for any path of least resistance to gain initial access to target organizations. During this time of crisis, as organizations have moved to a remote workforce, ransomware operators have found ... continue reading
blog2.png

Managing Patch Tuesday with Configuration Manager in a remote work world

The global health crisis has dramatically changed life for all of us. We are working to get you the information and guidance you need to keep your people productive and secure. Two weeks from today is Patch Tuesday, which will ... continue reading
AakashMSFT_0-1585744699370.png

Changes in Alert Management of SCOM 2019

Usage of SCOM2019 has been surging since its inception and we really appreciate all the feedback that we have been getting. As the product evolves to accommodate new features, there were few issues which needed immediate attention and we have ... continue reading
Introducing SDNSecurityToolkit

Introducing SDNSecurityToolkit

Thanks to William Conlon for authoring today's post! Every software producer has faced this challenge at some point: balancing flexibility with security. The most basic requirement of quality in any piece of software is that it will not expose the ... continue reading
Azure Unblogged - Microsoft Feedback and Customer engagement programs

Azure Unblogged – Microsoft Feedback and Customer engagement programs

Today, I want to share a new Azure Unblogged video, in which I had the chance to talk to Holly Lehman (Program Manager Azure CxP) to discuss Microsoft Feedback and Customer engagement programs. In this episode, Holly gives us an ... continue reading

Welcoming a more diverse workforce into cybersecurity: expanding the pipeline

Despite much focus on increasing the number of women in cybersecurity, as an industry we are still falling short. For many companies the problem starts with the tech pipeline—there just aren’t enough resumes from qualified female candidates. But I think ... continue reading

Secure access to all apps for your remote workforce

In response to the COVID-19 pandemic, organizations are turning to technology to help a remote workforce stay connected and productive. If you’re like most organizations, your employees use a lot of apps, from popular software-as-a-service (SaaS) apps—including collaboration services like ... continue reading
Screenshot showing apps in the My Apps portal.

Making it easier for your remote workforce to securely access all the apps they need, from anywhere

Since I published my last blog, Five identity priorities for 2020, COVID-19 has upended the way we work and socialize. Now that physical distancing has become essential to protect everyone’s health, more people than ever are going online to connect ... continue reading

Zero Downtime Deployments with Azure PaaS

How can I deploy my applications to Azure Platform-as-a-Service (PaaS) like Azure Kubernetes Service (AKS) without having any downtime? How can I automate this, and how can I ensure my customers won't notice changes are happening? In this interview, you ... continue reading

Migrate SQL workloads to the cloud with confidence

Wouldn't it be great if you could see how a workload will perform in a new environment before migrating a database to the cloud? Then you could fix any queries that have compatibility errors or move forward with the migration ... continue reading
Schedule customer meetings with Microsoft Bookings

Schedule customer meetings with Microsoft Bookings

Microsoft Bookings is a tool that is available within Office 365, it is available to those with plans including Business Premium, Enterprise E3 and Enterprise E5. Essentials Bookings is a way of scheduling appointments. Bookings is a Cloud based app, ... continue reading
Stretch-01-Config.png

Disaster Recovery in the next version of Azure Stack HCI

Disaster can hit at any time. When thinking about disaster and recovery, I think of 3 things Be prepared Plan on not involving humans Automatic, not automated Having a good strategy is a must. You want to be able to ... continue reading
Enable remote collaboration quickly and securely with Azure AD

Enable remote collaboration quickly and securely with Azure AD

During these challenging times, we’ve continued to collaborate closely with our customers as they react to the COVID-19 outbreak. From helping schools move quickly to enable distance learning, to supporting IT departments rapidly scale to support remote working scenarios, we’re ... continue reading
Screen shot of Editor within Microsoft Word helping provide insights like readability, count of distinct words, time to read, and time to speak.

Extending the power of Azure AI to Microsoft 365 users

Today, Yusuf Mehdi, Corporate Vice President of Modern Life and Devices, announced the availability of new Microsoft 365 Personal and Family subscriptions. In his blog, he shared a few examples of how Microsoft 365 is innovating to deliver experiences powered ... continue reading
SMB Compression: Deflate your IO

SMB Compression: Deflate your IO

Hi folks, Ned Pyle guest-posting today about SMB Compression, a long-awaited option coming to Windows, Windows Server, and Azure. As you know, the growth of cheap storage and plentiful network bandwidth over the past decade had an immediate effect: files ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 3 – Devices

For our second stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Device security. For anyone new joining us on this journey please ensure you check out Part I: Overview and ... continue reading