Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Diagram showing the multi-phase phishing attack chain

Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

We have recently uncovered a large-scale, multi-phase campaign that adds a novel technique to traditional phishing tactics by joining an attacker-operated device to an organization’s network to further propagate the campaign. We observed that the second stage of the campaign ... continue reading
A snapshot example of how much Azure Hybrid Benefit can save when moving Windows Server workloads to Azure

Save big by using your on-premises licenses on Azure

Are you still hesitating to move some or all your workloads to the cloud due to the added cost? One of the easiest ways to significantly lower your cost of ownership is by using a special licensing offer called Azure ... continue reading
The Azure Stack HCI Playlist

The Azure Stack HCI Playlist

Are you planning to design, deploy, manage an Azure Hybrid solution? Then you are happy to hear that we have created an Azure Stack HCI video playlist. This Azure Stack HCI playlist will give you access to the tutorials, best ... continue reading
Security leaders report that their top security challenge is managing increased risk of ransomware and cyber-extortion (29%). This is followed by ensuring cloud resources, workloads, and apps are securely configured (28%), gaps in protection across hybrid, multi-cloud, and multi-platform environment (27%), challenge recruiting security professionals (26%), and enabling end user productivity without sacrificing security (25%).

How CISOs are preparing to tackle 2022

Looking back over the last year, the security landscape has continued to experience significant change and escalation. Every day, we see the toll this is taking on organizations of all sizes as they navigate the enduring challenges of the pandemic, ... continue reading
Deep dive: How Azure AD Kerberos works

Deep dive: How Azure AD Kerberos works

If you have ever explored the differences between Active Directory (AD DS) and Azure Active Directory (Azure AD), you would have found that Azure Active Directory doesn't support the Kerberos authentication protocol, but Active Directory does. Kerberos is used to ... continue reading
A line chart showing the number of D D o S attacks from July 2021 to January 2022.

Azure DDoS Protection—2021 Q3 and Q4 DDoS attack trends

This blog post was co-authored by Anupam Vij, Principal PM Manager, and Syed Pasha, Principal Network Engineer, Azure Networking In the second half of 2021, the world experienced an unprecedented level of Distributed Denial-of-Service (DDoS) activity in both complexity and ... continue reading
An example showing that the static usage of the server capacity never went above 30 percent, indicating a huge opportunity for savings by reserving virtual machine instances and capacity with a discount.

Rightsize to maximize your cloud investment with Microsoft Azure

If you are running on-premises servers, chances are that you utilize a fraction of your overall server cores most of the time but are forced to over-provision to handle peak loads. Moving those workloads to the cloud can greatly reduce ... continue reading
Azure Open Source Day image banner.

7 reasons to attend Azure Open Source Day

To show you the latest capabilities of using Linux and Azure—and share some exciting announcements—we will be hosting Azure Open Source Day on Tuesday, February 15, 2022, from 9:00 AM to 10:30 AM Pacific Time. Push your apps and data ... continue reading
Azure AD and Azure Identities and Roles Overview Dashboard

Azure Identities and Roles Governance dashboard at your fingertips

Hello, dear readers! My name is Hélder Pinto, I am an Azure Infra Customer Engineer based in Portugal, working mostly with customers in Western Europe, and I am back here to share with you some useful tools to help you ... continue reading
External Identities B2C supports Authenticator apps, and new data residency pricing

External Identities B2C supports Authenticator apps, and new data residency pricing

Hello friends, Happy new year everyone! With the new year come new possibilities. Today I’m excited to announce two Azure AD External Identities updates including the public preview of multi-factor authentication (MFA) with time-based one-time passcode (time-based OTP) for B2C ... continue reading

Celebrating 20 Years of Trustworthy Computing

20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. The initiative was intended to put customer security, and ultimately customer trust, at the forefront for ... continue reading
Unable to find package provider

When PowerShellGet v1 fails to install the NuGet Provider

Recently there’s been a number of users who have encountered a particular bug with PowerShellGet 1.0.0.1 in Windows PowerShell. This bug occurs when you try to to use a PowerShellGet cmdlet that is dependent on PackageManagement, including cmdlets such as ... continue reading
™

Build a stronger cybersecurity team through diversity and training

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post of our Voice of the Community blog series, Microsoft Security Product Marketing Manager Natalia Godyla talks ... continue reading
Azure Lighthouse - A service provider perspective

Azure Lighthouse – A service provider perspective

Hello folks I partnered with the product group and actual IT professionals outside of Microsoft to create a video series where we look at Azure Lighthouse and its benefits from a variety of different perspectives. Have you thought about how ... continue reading
Windows Server 2022 VM Migration

Windows Server 2022 VM Migration

Welcome to ‘From the RoK to the Cloud'. In this series, Tom Hall chats with some amazing people from around the Microsoft universe, about anything to do with Windows Server. In today’s episode, were joined by Pierre Roman from the ... continue reading

Achieving Zero Trust readiness in your apps #2: Designing for Least Privilege

Hello again! I’m Jeff Sakowicz, Principal Program Management Lead for Application Platform Security within the Microsoft Identity team. Our team’s goal is to foster a secure, trustworthy, and thriving app ecosystem. Part of achieving this goal is enabling apps to ... continue reading
Getting started with Azure Bicep

Getting started with Azure Bicep

As technology has evolved, so have the tools we can use to build (or rebuild!) standard, repeatable system configurations. I remember building my first Windows-based computer systems using an "answer file" to populate and bypass the "out of the box" ... continue reading

What does “open” really mean to you?

In the world we live in today, almost every announcement has the word “open” in it. Unfortunately, it feels like there are as many definitions of what “open” means as there are announcements mentioning it. Sometimes it means “we have ... continue reading
Avanade Intelligent Store image shows customer touchpoints that can be enhanced by data-driven experiences.

Delivering the connected shopping experience: How Microsoft and Avanade are reimagining retail

This blog post has been co-authored by Charlie Lagervik, Principal Program Manager. Consumers today demand flexibility and convenience in how they purchase everything from groceries to home goods. In addition to shopping online, they are increasingly using mobile devices and ... continue reading
1.png

Windows 10 or Windows 11 GPO ADMX – Which one to use for your central store?

Hi community, My name is Helmut Wagensonner. I’m a Customer Engineer at Microsoft and this blog should help you to understand, which Administrative Templates (admx) to choose for your Windows 11 / Windows 10 mixed environment. Remember how it was ... continue reading

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware first appeared on victim systems in Ukraine on January 13, 2022. Microsoft is aware of the ongoing geopolitical events in ... continue reading
Zero Trust Adoption Report bar chart showcasing the varying levels of Zero Trust adoption across Microsoft Exchange, Zoom Credentials, SolarWinds, Robinhood, Intel, and Fireye.

Learn about 4 approaches to comprehensive security that help leaders be fearless

The last 18 months have put unprecedented pressure on organizations to speed up their digital transformation as remote and hybrid work continue to become the new normal. Yet even with all the change and uncertainty, having the right security support ... continue reading

5 reasons to attend the Azure Virtual Desktop Master Class

There’s still time to register for the Azure Virtual Desktop Master Class on Tuesday, January 25, 2022, from 9:00 AM to 12:00 PM Pacific Time. Join us to expand your cloud desktop virtualization skillset and learn how to deliver secure ... continue reading
AakashMSFT_0-1639687393773.png

SCOM Microsoft 365 V2

-----Update on Jan 13, 2022----- M365 V2 is GA which can be downloaded here. For users who are already on CTP, no further steps are needed. P.S: There is a known issue with “M365 Connection State Monitor” which is generating ... continue reading
Total Economic Impact of implementing Zero Trust with Microsoft shows 92 percent R O I and $11.6 million N P V.

Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study

In the last two years, we’ve seen a staggering increase in the adoption of cloud-based services, remote work solutions, bring your own device (BYOD), and IoT devices as organizations digitally transform themselves to enable a hybrid workforce.1 Zero Trust has ... continue reading
From the RoK to the Cloud - Azure Stack HCI

From the RoK to the Cloud – Azure Stack HCI

Welcome to ‘From the RoK to the Cloud'. In this series, Tom Hall chats with some amazing people from around the Microsoft universe, about anything to do with Windows Server. In today’s episode, were joined by Sven Langenfeld Senior Azure ... continue reading
Azure Container Apps - CI/CD deployments (Video Demo)

Azure Container Apps – CI/CD deployments (Video Demo)

Azure Container Apps is a container orchestration platform for deploying modern applications and microservices. With Azure Container Apps you can deploy your containerized apps without the need to take on the overhead of managing the infrastructure of the underlying systems ... continue reading
Join us to build solutions using Decentralized Identities

Join us to build solutions using Decentralized Identities

Each day cybersecurity attacks put organizations and customer data at risk, causing companies to think differently about how they manage data and the level of risk involved. Users want to know that their digital transactions will be both seamless and ... continue reading

Align your security and network teams to Zero Trust security demands

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with Jennifer ... continue reading
Screenshot of the Security & Privacy pane on macOS

New macOS vulnerability, “powerdir,” could lead to unauthorized user data access

Following our discovery of the “Shrootless” vulnerability, Microsoft uncovered a new macOS vulnerability, “powerdir,” that could allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, thereby gaining unauthorized access to a user’s protected data. We ... continue reading