Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

All you need to know about Windows Server at Ignite 2019

Ready, set, go! The Windows Server team is ready to make sure you are set up for success at Microsoft Ignite 2019. Our experts are busy preparing technical content for breakout sessions, theater sessions and hands-on-workshops. Youll find the schedule ... continue reading

Top 6 email security best practices to protect against phishing attacks and business email compromise

Most cyberattacks start over email—a user is tricked into opening a malicious attachment, or into clicking a malicious link and divulging credentials, or into responding with confidential data. Attackers dupe victims by using carefully crafted emails to build a false ... continue reading

Guarding against supply chain attacks—Part 1: The big picture

Every day, somewhere in the world, governments, businesses, educational organizations, and individuals are hacked. Precious data is stolen or held for ransom, and the wheels of “business-as-usual” grind to a halt. These criminal acts are expected to cost more than ... continue reading
Using PowerShell to View and Remove Wireless Profiles in Windows 10 – Part 4

Using PowerShell to View and Remove Wireless Profiles in Windows 10 – Part 4

Summary: Using Windows PowerShell to purge Wlan profiles with NetSh.exe. Last week we had a way with a Regular Expression to run one Netsh.exe command and show only the profile names as a PowerShell Array. Today we’re going to finish ... continue reading
Trusted Cloud

Trusted Cloud: security, privacy, compliance, resiliency, and IP

Can you trust your cloud provider? That’s a question being asked a lot of these days, and with the newest version of our popular white paper Trusted Cloud: Microsoft Azure security, privacy, compliance, resiliency, and protected IP we’ve worked to ... continue reading

Microsoft’s 4 principals for an effective security operations center

The Microsoft Cyber Defense Operations Center (CDOC) fields trillions of security signals every day. How do we identify and respond to the right threats? One thing that won’t surprise you: we leverage artificial intelligence (AI), machine learning, and automation to ... continue reading
Hackathon1

Microsoft Azure AI hackathon’s winning projects

We are excited to share the winners of the first Microsoft Azure AI Hackathon, hosted on Devpost. Developers of all backgrounds and skill levels were welcome to join and submit any form of AI project, whether using Azure AI to ... continue reading
git-pic1.png

Getting Started with Git

shared his six Git commands for beginners in a blog post, in this post I share my journey of learning Git, the commands I use and how you get involved further. It’s one of those tools, products that I always ... continue reading

Azure Monitor adds Worker Service SDK, new ASP.NET core metrics

Application Insights from Azure Monitor empowers developers and IT professionals to observe, debug, diagnose, and improve their distributed services hosted on the cloud, on-premises, and through hybrid solutions. The release of the Application Insights for ASP.NET Core 2.8.0 for web ... continue reading
Graph of price-performance comparison. The price-performance metric is price divided by throughput (transactions per second, tps).

Azure SQL Database: Continuous innovation and limitless scale at an unbeatable price

More companies are choosing Azure for their SQL workloads, and it is easy to see why. Azure SQL Database is evergreen, meaning it does not need to be patched or upgraded, and it has a strong track record of innovation ... continue reading
sqlmigrate.jpg

SQL Server Migration to Azure Live Show

You’re invited to join the SQL Server Migration to Azure Live Show on October 14th (Part 1) and October 15th (Part 2) from 8-10AM PST. Click here to register! Part 1: Why migrate, migration options and tools Part 2: Best ... continue reading

How to stream big data with Data Accelerator for Apache Spark

Geoff Staneff joins Donovan Brown to show how Data Accelerator for Apache Spark simplifies everything from onboarding to streaming of big data. It offers a rich, easy-to-use experience for creating, editing, and managing Apache Spark jobs on Azure HDInsight while ... continue reading

How to execute Azure Machine Learning service pipelines in Azure Data Factory

Gaurav Malhotra joins Scott Hanselman to show how you can run your Azure Machine Learning (AML) service pipelines as a step in your Azure Data Factory (ADF) pipelines. This enables you to run your machine learning models with data from ... continue reading

New Data Exposed episode: It’s just SQL: Restoring a database to Azure SQL DB from backup

In this video, Jeroen ter Heerdt shows how to restore a database to Azure SQL from a BACPAC file. Read more about importing an Azure SQL Database from BACPAC ... continue reading

New Data Exposed episode: How to manage R packages in Azure SQL Database with sqlmlutils

Currently, Azure SQL Database has ML Services with R available in preview. In this video, Anna Hoffman gives a brief overview of how you can use an open source package called sqlmlutils to easily connect and add/remove packages to Azure ... continue reading
Azure Security Foundations Benchmark Recommendations table

CIS Azure Security Foundations Benchmark open for comment

One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage ... continue reading
The team of interns at the New England Research and Development Center in Cambridge

Leveraging Cognitive Services to simplify inventory tracking

Who spends their summer at the Microsoft Garage New England Research & Development Center (or “NERD”)? The Microsoft Garage internship seeks out students who are hungry to learn, not afraid to try new things, and able to step out of ... continue reading
PowerShell Basics: How to Force a Full Password Sync in AzureAD Connect

PowerShell Basics: How to Force a Full Password Sync in AzureAD Connect

Before starting this post, the team would like to thank all the contributions shared by the PowerShell community found on Reddit for their support on exploring PowerShell automation capabilities. The outpouring of suggestions and sharing of scripts was awesome and ... continue reading
A picture containing scissors  Description automatically generated

PowerTip: Show all Installed Capabilities on Windows 10

Summary: Identify if capabilities like OpenSSH are installed in your Windows 10 Operating System Hey, Doctor Scripto. I was curious if there was a way to see if a workstation has a capability installed on it like OpenSSH. I’m trying ... continue reading
A picture containing scissors  Description automatically generated

PowerTip: Show all Installed Capabilities on Windows 10

Summary: Identify if capabilities like OpenSSH are installed in your Windows 10 Operating System Hey, Doctor Scripto. I was curious if there was a way to see if a workstation has a capability installed on it like OpenSSH. I’m trying ... continue reading

Patching as a social responsibility

In the wake of the devastating (Not)Petya attack, Microsoft set out to understand why some customers weren’t applying cybersecurity hygiene, such as security patches, which would have helped mitigate this threat. We were particularly concerned with why patches hadn’t been ... continue reading
Using PowerShell to View and Remove Wireless Profiles in Windows 10 – Part 3

Using PowerShell to View and Remove Wireless Profiles in Windows 10 – Part 3

Summary: Using Regular Expressions to cleanup string data from NetSh.exe. Let’s remember the last two discussions. The first time we looked at using PowerShell to identify wireless profiles with some simple regular expressions. We followed up the next week with ... continue reading
Using PowerShell to View and Remove Wireless Profiles in Windows 10 – Part 3

Using PowerShell to View and Remove Wireless Profiles in Windows 10 – Part 3

Summary: Using Regular Expressions to cleanup string data from NetSh.exe. Let’s remember the last two discussions. The first time we looked at using PowerShell to identify wireless profiles with some simple regular expressions. We followed up the next week with ... continue reading
Windows Containers and Rancher 2.3

Windows Containers and Rancher 2.3

By Mike Kostersitz, Principal Program Manager, Microsoft Container technology is transforming the face of business and application development. 70% of on-premises workloads today are running on the Windows Server operating system and enterprise customers are looking to modernize these workloads ... continue reading

How to avoid getting caught in a “Groundhog Day” loop of security issues

It’s Cyber Security Awareness Month and it made me think about one of my favorite movies, called Groundhog Day. Have you ever seen it? Bill Murray is the cynical weatherman, Phil Connors, who gets stuck in an endless loop where ... continue reading
In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Our experience in detecting and blocking threats on millions of endpoints tells us that attackers will stop at nothing to circumvent protections. Even one gap in security can be disastrous to an organization. At Microsoft, we don’t stop finding new ... continue reading
How does the PXE boot process work?

How does the PXE boot process work?

Within the IT department imaging devices for end users is something that we’ve probably all had to do at some point, either manually or with an automation product such as Windows Deployment Services (WDS), Microsoft Deployment Toolkit (MDT) or System ... continue reading
Extended Security Updates and Configuration Manager

Extended Security Updates and Configuration Manager

Support for Windows 7 comes to an end on January 14, 2020, and to remain current and supported, customers need to make the shift to Windows 10. For help planning and deploying Windows 10, Microsoft offers guidance and other resources ... continue reading
Infographic showing the classic SIEM model: Incidents, Alert Queue, Primary Investigation, Pivot and Remediate.

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

The Lessons learned from the Microsoft SOC blog series is designed to share our approach and experience with security operations center (SOC) operations. Our learnings in the series come primarily from Microsoft’s corporate IT security operation team, one of several ... continue reading

Windows Server 2019 adds support for Office 365 ProPlus

Today were introducing Office 365 ProPlus support for Windows Server 2019 customers with on-premises and Azure deployments. Weve also enabled customers to immediately download and leverage FSLogix functionality, including the Office 365 Container, to enhance the speed and performance around ... continue reading
Loading...