Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Telemetry2.gif

LOG SENSOR AND TELEMETRY SERVICE IN ISOLATED NETWORK

Dear IT Pros, We knew that it is normal for Domain Controller and critical servers to be in isolated network without internet access. How could we provide the cloud-based, Azure log analytic services for these objects? The services could originate ... continue reading
Microsoft Information Protection capabilities.

How to protect your CAD data files with MIP and HALOCAD

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Computer-aided design (CAD) files are used by design professionals in the manufacturing, engineering, architecture, surveying, and construction industries. These highly valuable files contain confidential ... continue reading

A guide to balancing external threats and insider risk

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Rockwell Automation Vice ... continue reading
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure

When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure

[Note: In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts ... continue reading
Step-by-Step: How to update an Azure Linux VM using Update management

Step-by-Step: How to update an Azure Linux VM using Update management

Operating system updates include feature updates, bug fixes, and security improvements and are important to update periodically. This applies to desktop computers as well as servers. There are many tools available to manage the Windows update process. When it comes ... continue reading
A matrix of attack techniques related to containerization technologies, organized by stages of an attack.

The evolution of a matrix: How ATT&CK for Containers was built

Note: The content of this post is being released jointly with the Center for Threat-Informed Defense. It is co-authored with Chris Ante and Matthew Bajzek. The Center post can be found here. As containers become a major part of many ... continue reading
Azure Arc for Developers

Azure Arc for Developers

Azure Arc and the Azure control plane enables developers to build hybrid and mutlicloud architectures for their applications. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build ... continue reading
msa and eotp image.PNG

Do more with External Identities user flows in just a few clicks

Hello friends, Thanks to your feedback, we have been steadily making identity for customer and partner-facing applications more flexible and faster to configure out of the box. Today we are making it easier for users with different identities to sign ... continue reading
Verify Service Principal was created

Register the Azure AD Connect Health for ADDS Agent via Service Principal

Hi everyone! Graeme Bray back with you for a new journey.  Today's adventure is to leverage an Azure AD Service Principal to register  the Azure AD Connect Health agent (ADDS or ADFS) with the portal, rather than utilizing a Cloud-only MFA exempt account (specifically ... continue reading

Why do developers use Azure DevOps Services?

DevOps - that wonderful name that brings developer and operations processes together to support continuous delivery of software updates. It's a different discipline to managing infrastructure or monitoring servers, though Infrastructure as Code has a place in DevOps processes. Today's ... continue reading
How MU-MIMO works: measure channel state information, calculate precoding matrix, and apply precoding before transmission.

How cloud computing can improve 5G wireless networks

A great deal has been written about the technologies fueling 5G, especially how those technologies will improve the experience that users have regarding connectivity. Similarly, much has been said about how ongoing developments in technology will usher in a new ... continue reading
Azure Firewall Premium capabilities

Next-generation firewall capabilities with Azure Firewall Premium

This post was co-authored by Gopikrishna Kannan, Principal Program Manager, Azure Networking and Suren Jamiyanaa, Program Manager 2, Azure Networking. Following the preview release announced in February 2021, we are announcing the general availability release of Microsoft Azure Firewall Premium ... continue reading
CNO-DNN.png

Failover Clustering in Azure

Azure is a cloud computing platform with an ever-expanding set of services to help you build solutions to meet your business goals. Azure services range from simple web services for hosting your business presence in the cloud to running fully ... continue reading

Issue and accept verifiable credentials using Azure Active Directory

Sydney Morton joins Scott Hanselman to show how verifiable credentials enable you to own and prove who you are in the digital world. See how to enable decentralized identity through seamless user and developer experiences.[0:00:00]– Intro[0:00:37]– Overview[0:03:01]– Demo – end ... continue reading
sifriger_1-1625049836482.png

Azure Sentinel – How to Audit Management Groups

Hi folks!! Simone is back to you. Probably, most of you know that when you enable Azure Activity connector in Azure Sentinel Connector’ s blade almost every audit log generated from Azure resources is saved in the AzureActivity Table. Well, ... continue reading
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

The Microsoft Threat Intelligence Center (MSTIC) alongside the Microsoft Security Response Center (MSRC) has uncovered a private-sector offensive actor, or PSOA, that we are calling SOURGUM in possession of now-patched, Windows 0-day exploits (CVE-2021-31979 and CVE-2021-33771). Private-sector offensive actors are ... continue reading

MISA expands portfolio and looks ahead during Microsoft Inspire

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA. Welcome to fiscal year 2022 (FY22) and my first official blog as the MISA Lead. It’s been a whirlwind couple of months getting up ... continue reading

How Microsoft Security empowers partners to build customer trust

As I reflect on my first year at Microsoft, it was both challenging and exceptional: from my remote onboarding in the middle of a pandemic to dramatic changes in the cyber landscape, to Microsoft’s critical role as a frontline responder ... continue reading
Build a strong Zero Trust Foundation starting with identity and endpoint management

Build a strong Zero Trust Foundation starting with identity and endpoint management

Last year at Microsoft Inspire, we shared gratitude for the amazing work our partners did in helping our joint customers rapidly shift to remote work. As the world continues to evolve and the new reality takes hold, two trends are ... continue reading
SecurityLevel.png

Security Settings for Failover Clustering

Security is at the forefront of many administrator's minds and with Failover Clustering, we did some improvements with Windows Server 2019 and Azure Stack HCI with regards to security. Since the beginning of time, Failover Clustering has always had a ... continue reading
Microsoft discovers threat actor targeting SolarWinds Serv-U software with 0-day exploit

Microsoft discovers threat actor targeting SolarWinds Serv-U software with 0-day exploit

Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. The Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out ... continue reading
Learn about Azure VMware Solution migrations

Learn about Azure VMware Solution migrations

In the early 2000s, before the arrival of Hyper-V, I learned how to run multiple servers on one piece of hardware using VMware Workstation. This gave our small organisation a level of local redundancy, running two internal clustered Lotus Domino ... continue reading
Azure Bastion Architecture Overview.

Manage RDP and SSH connectivity at scale with Azure Bastion

Security is at the forefront of user and administrator connectivity to cloud services. As enterprises continue to move mission-critical applications to the cloud, the need for secure, scalable, and reliable remote public connectivity and jumpbox services increases. With this shift, ... continue reading
HoussemDellai_0-1625825418350.png

Kubernetes Nodepools Explained

Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: What are nodepools ? What are System and User nodepools ? How to schedule application pods on a specific nodepool using Labels and nodeSelector ? ... continue reading

Enhance your cloud skills and accelerate digital transformation with Inside Azure for IT

Over the last year, we’ve seen accelerated cloud adoption and digital transformation across every industry—all aimed at optimizing business operations, saving money, and enhancing customer experiences. As organizations continue to transform, IT will continue to be in a position of ... continue reading
Well Architected Review (img1)

Advancing application reliability with the Azure Well-Architected Framework

“For two years now, my ongoing Advancing Reliability blog series has highlighted initiatives and investments underway to keep improving the reliability of our Azure platform and services. But what about your own Azure applications that run on top of these—how ... continue reading

Azure Cosmos DB cache, serverless MongoDB and Managed Apache Cassandra

Kirill Gavrylyuk and friends join Scott Hanselman to discuss Azure Cosmos DB updates: integrated cache, serverless for MongoDB API, and Managed Instance for Apache Cassandra with dual write proxy.[0:00:00]– Opening[0:01:33]– Integrated cache with Tim Sander[0:17:36]– Serverless for MongoDB API with ... continue reading

Privileged Identity Management with Azure Lighthouse enables Zero Trust

Recent incidents from ransomware to supply chain compromises have shown both the interconnectedness of our digital world and the critical need to secure these digital assets from attackers, criminals, and other hostile third parties. To achieve this, our customers need ... continue reading
Windows Package Manager can help you export and import a collection of software!

Windows Package Manager can help you export and import a collection of software!

Have you ever got your PC to the state where it has all the settings and software installed and configured that you need to use and it’s just in the right state for your daily tasks and then bam something ... continue reading

How to build a privacy program the right way

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with attorney Whitney Merrill, ... continue reading