Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.


Forrester names Microsoft a Leader in the 2021 Enterprise Email Security Wave

Today, organizations face an evolving threat landscape and an exponentially increasing attack surface. Email represents the primary attack vector for cybercrime, and security teams are in search of efficient and cost-effective means to minimize the risk of these threats and ... continue reading
Business email compromise campaign targets wide range of orgs with gift card scam

Business email compromise campaign targets wide range of orgs with gift card scam

Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to ... continue reading

Business email compromise: How Microsoft is combating this costly threat

Amongst all cybercrime, phishing attacks continue to be the most prevalent today. With over 90 percent of attacks coming via email, it’s important that every organization has a plan to prevent these threats from reaching users. At Microsoft, we’re passionate ... continue reading

Announcing PowerShell Crescendo Preview.2

We are pleased to announce the second preview of PowerShell Crescendo, a framework to rapidly develop PowerShell cmdlets for native commands, regardless of platform. The updated preview releases are now available for download on the PowerShell Gallery: Microsoft.PowerShell.Crescendo Preview 2 ... continue reading
Azure Backup Center – Report on and Optimize your Backup environment.

Azure Backup Center – Report on and Optimize your Backup environment.

Hello folks, In the first post in this series, we explored the overall capabilities ABC is the one single place for all simplified backup needs. As mentioned before, everything in one interface one place to discover and configure, to operate ... continue reading
Number of tests in which the vendor blocked the attack at earliest stage possible. Microsoft successfully blocked at the earliest possible point on six protection tests, more than any other vendor participating in the test.

Stopping Carbanak+FIN7: How Microsoft led in the MITRE Engenuity® ATT&CK® Evaluation

In MITRE Engenuity’s recent Carbanak+FIN7 ATT&CK Evaluation, Microsoft demonstrated that we can stop advanced, real-world attacks by threat actor groups with our industry-leading security capabilities. In this year’s evaluation, we engaged our unified Microsoft 365 Defender stack, with market-leading capabilities ... continue reading


Dear IT Pros, Ransomware acts with accessing to the files, folders and encrypting them, to respond against it, we need to enable the Windows Defender feature named “Controlled Folder Access” – WDCFA and monitor the Windows Defender Guard Events in ... continue reading
Graphic depicting the technical characteristics of IoT and their unique challenges. Characteristics include running automated workloads, aging infrastructure, and limited connectivity.

How to apply a Zero Trust approach to your IoT solutions

For many, 2020 was a year of survival as they rapidly transformed their businesses in response to a new normal. From enabling new remote and hybrid work models to implementing new technology to help optimize operations, the last year has ... continue reading
Upload Files to Azure Blob Storage using Power Automate Desktop

Upload Files to Azure Blob Storage using Power Automate Desktop

In this blog post, we are going to have a look at how you can automatically upload files to an Azure Blob storage account using Power Automate Desktop. Power Automate Desktop is a great tool to build automation on your ... continue reading

On Prem To The Cloud: Security is Not an Afterthought (episode 9)

Our customers have been wanting some more basic, getting started material on taking their on prem applications and moving them to the cloud. This video series does just that. Starting with a simple on prem solution, lifting and shifting and ... continue reading
Azure Backup Center – Your one-stop for all things backups.

Azure Backup Center – Your one-stop for all things backups.

Hello Folks, We live in a world where the only constant is change. Actually… There might be one thing that has not changed for IT pros and operation folks… The need for an appropriate backup strategy. Today, in this world ... continue reading
Understanding Microsoft Azure Virtual Machine sizes

Understanding Microsoft Azure Virtual Machine sizes

Having an on-premises infrastructure background, I’m used to scoping hardware by defining the specifications (CPU, memory etc) we’ll need to run the applications and expected concurrent users and allowing for some growth. Then we’d often buy a box that would ... continue reading
Demo of Microsoft Counterfit used to scan an AI model for model evasion vulnerability.

AI security risk assessment using Counterfit

Today, we are releasing Counterfit, an automation tool for security testing AI systems as an open-source project. Counterfit helps organizations conduct AI security risk assessments to ensure that the algorithms used in their businesses are robust, reliable, and trustworthy. AI ... continue reading

Set Your Alert State Using Azure Automation

Hello blog readers One of recurring questions during my customer engagements on Azure Monitor is: how do I set alert state to either Acknowledged or Closed with no manual intervention? This question is broader and deeper than it appears. In ... continue reading
Image InteractivePromptStoppingTheOldSolution

Sending data to the Clipboard from PowerShell

Q: Hey I have a fun question! I remember reading a while back about using VBScript to paste to the clipboard. Are we able to do that with PowerShell? A: Why yes, yes we can! It is far often a ... continue reading

Simplify moving resources between regions with Azure Resource Mover

Sujay Talasila joins Scott Hanselman to discuss various scenarios and benefits of Azure Resource Mover for moving your resources across regions using a seamless unified experience.[0:00:00]– Introduction[0:02:35]– Demo: Moving resources across regions[0:11:46]– Demo: Change configuration during move[0:15:57]– Discussion[0:18:00]– Wrap-upAzure Resource ... continue reading

Finding a Process Which Sporadically Locks the Workstation

Hi all, A customer of mine recently reported an issue that some workstations sporadically lock while the user is working and asked if we could figure out the culprit. Here is the story. First let me mention that Konstantin Chernyi, ... continue reading
Scaling with Azure

Scaling with Azure

In today’s world we must be able to scale our workloads, whether that be dealing with an internal workload or an external workload serving your organisations’ customers. There are lots of options available to you to implement that scale and ... continue reading

On Prem To The Cloud: Cloud Native – Episode 8

Our customers have been wanting some more basic, getting started material on taking their on prem applications and moving them to the cloud. This video series does just that. Starting with a simple on prem solution, lifting and shifting and ... continue reading
Customize Windows Sandbox

Customize Windows Sandbox

In this blog post, I will show you how you can set up, configure and customize Windows Sandbox in Windows 10 using advanced Windows Sandbox config files. Windows Sandbox is based on Hyper-V technology and allows you to spin up ... continue reading

Step-by-Step: Configure and manage Microsoft Universal Print

Guest post by Microsoft Customer Engineer, Daniele De Angelis. It's a pleasure to be here again on the . Recently I had the opportunity to try the Microsoft Universal Print, the new cloud printing service on Azure. Today I ... continue reading
The shared responsibility model for cloud security. As cloud service provider takes responsibility for controls, the cloud customer can use their resources to focus on the controls for which they remain responsible.

Meet critical infrastructure security compliance requirements with Microsoft 365

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Every operator of an industrial control system also operates an IT network to service its productivity needs. A supervisory control and data acquisition (SCADA) system operator ... continue reading
April identity updates

April identity updates

Howdy folks, I’m excited to share the latest Active Azure Directory news, including feature updates, support depreciation, and the general availability of new features that will streamline administrator, developer, and end user experiences. These new features and feature updates show ... continue reading
Screenshot of a Microsoft Defender for Endpoint alert in the security center about a CoinMiner that was blocked.

Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT

Cryptocurrency mining—once considered no more than a nuisance, a relatively benign activity that was a drain on machine resources—has been on the rise in recent years. This increase in cryptocurrency mining activity is driven by the increasing value of cryptocurrencies ... continue reading
5 PowerShell Gallery modules for Windows Server Administration

5 PowerShell Gallery modules for Windows Server Administration

PowerShell Gallery contains lots of modules that you can add to a Windows Server deployment to make it easier to manage. In this article, I’ll cover a few of the ones I’ve found most useful over the years when it ... continue reading
Workbook tiles with a summary of Traffic Analytics state in all NSGs

Azure Network Security Hygiene with Traffic Analytics

Hello, dear readers! My name is Hélder Pinto and I am sharing here some tips about how to leverage NSG Flow Logs and Traffic Analytics to improve your Azure network security hygiene and, at the end, simplify your NSG rules ... continue reading

You Might Want to Audit Your LAPS Permissions….

Deploy LAPS, Check!  You’re all set, right?  Maybe… Hi team, Eric Jansen here again; I’m back after being reminded by a friend and reader that I've been away for too long. I’m trying to be better about it since I have a ton of content that I'd like to share and talk about, but these days ... continue reading

Evolving beyond password complexity as an identity strategy

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Troy Hunt, founder of Have I ... continue reading

Borrowing a built-in PowerShell command to create a temporary folder

Q: Hey I have a question for you. It seems silly and I know I could probably put something together with Get-Random. But can you think of another way to create a temporary folder with a random name in PowerShell? ... continue reading
Azure Unblogged - Event Hub on Azure Stack Hub

Azure Unblogged – Event Hub on Azure Stack Hub

In this latest episode of Azure Unblogged, I am chatting to Manoj Prasad from the Azure Event Hubs team, to cover how you can leverage Event Hubs on your Azure Stack Hub in your Hybrid Cloud environment. Event Hubs on ... continue reading