Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Table showing the AV-Comparatives test cases and the corresponding results for Microsoft Defender for Endpoint (rows) in the following areas (columns): LSASS dumping was possible, Extracting credentials (offline) from respective minidump file was possible, Prevention by AV module, and Detection by EDR module.

Detecting and preventing LSASS credential dumping attacks

Obtaining user operating system (OS) credentials from a targeted device is among threat actors’ primary goals when launching attacks because these credentials serve as a gateway to various objectives they can achieve in their target organization’s environment, such as lateral ... continue reading
Save time and money, reduce risk with Microsoft Entra provisioning updates

Save time and money, reduce risk with Microsoft Entra provisioning updates

The Microsoft Entra Azure Active Directory (Azure AD) provisioning service automates your identity lifecycle and keeps identities in sync across trusted source systems (like HR systems) and end applications that users need access to (like SaaS apps, on-premises apps, and ... continue reading
Examples of S3-compliant object storage providers compatible with SQL Server 2022.

Data Virtualization with PolyBase for SQL Server 2022

Part of the SQL Server 2022 blog series.Microsoft SQL Server 2022 introduces the newest version of PolyBase, and with it the capability to query data where it lives, virtualize data, and use REST APIs. REST APIs enable SQL Server to be ... continue reading
The overall management architecture includes Microsoft Azure Arc, Microsoft Azure Storage, Microsoft Azure Monitoring, Microsoft Azure Kubernetes and Kubernetes for Operator RAN extension.

Scalable management of virtualized RAN with Kubernetes

Among the many important reasons why telecommunication companies should be attracted to Microsoft Azure are our network and system management tools. Azure has invested many intellectual and engineering cycles in the development of a sophisticated, robust framework that manages millions ... continue reading
The overall management architecture includes Microsoft Azure Arc, Microsoft Azure Storage, Microsoft Azure Monitoring, Microsoft Azure Kubernetes and Kubernetes for Operator RAN extension.

Scalable management of virtualized RAN with Kubernetes

Among the many important reasons why telecommunication companies should be attracted to Microsoft Azure are our network and system management tools. Azure has invested many intellectual and engineering cycles in the development of a sophisticated, robust framework that manages millions ... continue reading

Cost optimization using Azure Migrate

The higher energy cost and the resulting increase in the cost of doing business have led to a tighter economic outlook for most businesses around the world. This, in turn, is a major contributing factor to customers becoming more cost-conscious, ... continue reading

Cost optimization using Azure Migrate

The higher energy cost and the resulting increase in the cost of doing business have led to a tighter economic outlook for most businesses around the world. This, in turn, is a major contributing factor to customers becoming more cost-conscious, ... continue reading
Security practitioner authenticating access on a Surface tablet while preparing to work from home.

Cybersecurity awareness tips from Microsoft to empower your team to #BeCyberSmart

October is Cybersecurity Awareness Month, and I’m excited about what Microsoft and our partners in the industry have planned to help everyone stay #CyberSmart. 2022 may have offered some respite from the previous year’s rush to enable a remote and ... continue reading

Microsoft and INT deploy IVAAP for OSDU Data Platform on Microsoft Energy Data Services

This post was co-authored by Fabrice Buron, Chief Commercial Officer, INT. Energy companies are currently going through a massive transformation by moving hundreds of applications to monitor, interpret, and administer their data into the cloud. In addition, they have embarked on ... continue reading

Slower SMB Read Performance for large files in 22H2

Heya folks, Ned here again. There is a performance regression in 22H2 when copying larger files from a remote computer down to a Windows 11 computer. A large (multi-GB file) might see as much as 40% less throughput over SMB when copying down ... continue reading
This image shows how the search space is formed. On the left is a node graph. On the right is a zoomed in version to a specific set of nodes and arrows labeled with the relationships between the nodes.

Advancing anomaly detection with AIOps—introducing AiDice

This blog post has been co-authored by Jeffrey He, Product Manager, AIOps Platform and Experiences Team. In Microsoft Azure, we invest tremendous efforts in ensuring our services are reliable by predicting and mitigating failures as quickly as we can. In ... continue reading
mg_structure.png

Azure Enterprise Policy as Code – Azure Landing Zones Integration

Welcome to Part 2 in a series about using the Enterprise Policy as Code project to deploy and manage Azure Policy in your environment. This article covers integration with Azure Landing Zones and how to integrate the policies applied in ... continue reading
Diagram of the attacks using Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082

Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082

October 1, 2022 update – Added information about Exploit:Script/ExchgProxyRequest.A, Microsoft Defender AV’s robust detection for exploit behavior related to this threat. We also removed a section on MFA as a mitigation, which was included in a prior version of this ... continue reading
MichaelHildebrand_0-1664556234291.png

Prepare for Cloud Service Disaster Recovery – Export Key M365 Services Configurations

Not too long ago, it was the first day of school, then it was the first NFL game and we just passed the first day of fall.  As seasons change, I am reminded of the things that I should do ... continue reading
LEDBAT Background Data Transfer for Windows

LEDBAT Background Data Transfer for Windows

LEDBAT is the background data transfer product built into the Windows networking stack and recommended by the Windows Data Transport team for moving bulk data without interfering with foreground traffic. LEDBAT has a couple of advantages that make it our ... continue reading

How one product manager builds community at Microsoft Security

I first met Joey Cruz not long after he joined the Microsoft Identity and Network Access (IDNA) team when he helped create demos for a keynote speech I was delivering. Joey has a way of making you feel that even ... continue reading

CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Alissa “Dr. Jay” ... continue reading
Attack chain diagram of ZINC campaign showing steps and related activities

ZINC weaponizing open-source software

In recent months, Microsoft has detected a wide range of social engineering campaigns using weaponized legitimate open-source software by an actor we track as ZINC. Microsoft Threat Intelligence Center (MSTIC) observed activity targeting employees in organizations across multiple industries including ... continue reading

Backup and restore to URL for S3-compatible object storage

Part of the SQL Server 2022 blog series.Backup and restore to simple storage service (S3)compatible object storage is a new feature introduced in SQL Server 2022 that grants the user the capability to back up or restore their databases using S3-compatible ... continue reading
Graphic showing Policy Analytics product experience. The graphic highlights the experience when clicking on the Single-rule analysis tab and when selecting a single rule to analyze.

Strengthen your security with Policy Analytics for Azure Firewall

This blog was co-authored by Gopikrishna Kannan, Principal Program Manager, Azure Networking. Network security policies are constantly evolving to keep pace with the demands of workloads. With the acceleration of workloads to the cloud, network security policies—Azure Firewall policies in ... continue reading
Figure 1 shows three panels, each of an Azure region that consists of 3 availability zones. Panel 1 shows that within each Azure region is a virtual network that contains a sing subnet. A virtual machine scale set consists of multiple virtual machines that are deployed across all three zones within the single subnet. NAT gateway is attached to the subnet from zone 1. In panel 2, zone 1 is down, which causes a loss of outbound connectivity across all three zones since all outbound connectivity goes through the zone 1 NAT gateway. Panel 3 shows that if zone 2 goes down, only outbound connectivity for virtual machines from that zone goes down. Outbound connectivity from zone 1 and 3 persists since NAT gateway is in a zone not impacted by the zone 2 outage.

Ensure zone resilient outbound connectivity with NAT gateway

Our customers—across all industries—have a critical need for highly available and resilient cloud frameworks to ensure business continuity and adaptability of ever-growing workloads. One way that customers can achieve resilient and reliable infrastructures in Microsoft Azure (for outbound connectivity) is ... continue reading
Defend your users from MFA fatigue attacks

Defend your users from MFA fatigue attacks

Protecting users from MFA fatigue attacks  With increasing adoption of strong authentication, multi-factor authentication (MFA) fatigue attacks (aka, MFA spamming) have become more prevalent. These attacks rely on the user’s ability to approve a simple voice, SMS or push notification that ... continue reading
Secure your users from social engineering attacks

Secure your users from social engineering attacks

Protecting users from MFA fatigue attacks  With increasing adoption of strong authentication, multi-factor authentication (MFA) fatigue attacks (aka, MFA spamming) have become more prevalent. These attacks rely on the user’s ability to approve a simple voice, SMS or push notification that ... continue reading

RoQC and Microsoft simplify cloud migration with Microsoft Energy Data Services

This post was co-authored by Ian Barron, Chief Technology Officer, RoQC. The vast amount of data in energy companies slows down their digital transformation. Together with RoQC solutions, Microsoft Energy Data Services will accelerate your journey in democratizing access to ... continue reading
Ingest and analyze data at scale with existing Azure services.

New Azure for Operators solution accelerator offers a fast path to network insights

5G marks an inflection point for operators. The disaggregation of software and hardware in 5G enables operators to move telecommunication workloads to public or hybrid public/private cloud infrastructures, giving them unprecedented agility and flexibility to deliver exceptional customer experiences and ... continue reading
AndrewCoughlin_1-1663847922790.png

How to determine what devices are connecting to a storage account

Have you ever wondered how to determine if any devices are still using a storage account blob, file, table, or queues? In this blog post I will talk about the process of setting up monitoring to understand if/what devices are ... continue reading
A diagram of the attack chain. It presents the flow of activity from left to right, starting with the attacker gaining access to its target tenant and leading to spam messages being sent to targets.

Malicious OAuth applications used to compromise email servers and spread spam

Microsoft researchers recently investigated an attack where malicious OAuth applications were deployed on compromised cloud tenants and then used to control Exchange servers and spread spam. The investigation revealed that the threat actor launched credential stuffing attacks against high-risk accounts ... continue reading

Azure Synapse Link for SQL

Part of the SQL Server 2022 blog series.Traditionally, data to serve analytical systems have been extracted from operational data stores using custom-built extract, transform, and load (ETL) processes. These processes are often long-running, exert pressure on the source systems, and only run ... continue reading
Engineer check and control welding robotics automatic arms machine in intelligent factory automotive industrial with monitoring system software. Digital manufacturing operation.

Future-ready IoT implementations on Microsoft Azure

IoT technologies continue to evolve in power and sophistication. Enterprises are combining cloud-to-edge solutions to connect complex environments and deliver results never before imagined. In the past eight years, Azure IoT has seen significant growth across many industry sectors, including ... continue reading

Cegal and Microsoft break down data silos and offer open collaboration with Microsoft Energy Data Services

This blog post was co-authored by Espen Knudsen, Principal Digitalization and Innovation Advisor, Cegal. The vast amount of applications and data in energy companies across isolated environments is exposing inefficiencies in collaboration. Together with Cegal Cetegra, Microsoft Energy Data Services ... continue reading