Microsoft Cloud Library
Articles about Microsoft Cloud
Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.
Select a Topic to view articles of just that Topic. Select All to view the entire library.
Increasing Transparency into Azure Active Directory’s Resilience Model
Over the last two years we’ve been sharing the progress on Azure AD’s resilience investments, such as our 99.99% Service Level Agreement (SLA), our core resilience principles and architecture, and our differentiated resilience features like our automatic backup authentication service, ... continue reading

Explore the latest features for Datadog—An Azure Native ISV Service
Datadog – An Azure Native ISV Service, that brings the power of Datadog’s observability capabilities to Azure, is generally available since 2021. The natively integrated service allows you to monitor and diagnose issues with your Azure resources by automatically sending logs ... continue reading

Azure Virtual WAN now supports full mesh secure hub connectivity
In May 2023, we announced the general availability of Routing intent and routing policies for all Virtual WAN customers. This feature is powered by the Virtual WAN routing infrastructure and enables Azure Firewall customers to set up policies for private ... continue reading

Azure Monitor: Gain Observability Over Guest Users
Hello howdy readers, Not too long passed since my last post on Azure Monitor; I couldn’t leave you alone . In this post, I would like to explore something about gaining and keeping observability over guest users. Guest users ... continue reading
Check This Out! (CTO!) Guide (May 2023)
Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are trying ... continue reading
SMB signing required by default in Windows Insider
Heya folks, Ned here again. Beginning in Windows 11 Insider Preview Build 25381 (Canary, zn_release) Enterprise editions, SMB signing is now required by default for all connections. This changes legacy behavior, where Windows 10 and 11 required SMB signing by ... continue reading
Network Design Guide for Azure VMware Solution
I have previously talked about Azure VMware Solution Landing Zone Accelerator (AVS LZ) and the automation tools in my previous blog post. This open-source solution provides an architectural approach and reference implementation to prepare Azure landing zone subscriptions for a scalable ... continue reading
Increase gaming performance with NGads V620-series virtual machines
Gaming customers across the world tend to look for the same critical components when choosing their playing environment: Performance, Affordability, and Timely Content. And for gaming in the cloud, there’s a fourth: Reliability. With these clear guidelines in mind, we are ... continue reading

XDR meets IAM: Comprehensive identity threat detection and response with Microsoft
Identity has become the corporate security perimeter. The average organization used 130 different cloud applications in 2022. That’s up 18 percent from 2021 alone.1 And as organizations continue to embrace digital transformation and enable remote work, they look to identity ... continue reading

Microsoft Cost Management updates—May 2023
Whether you’re a new student, a thriving startup, or the largest enterprise, you have financial constraints, and you need to know what you’re spending, where it’s being spent, and how to plan for the future. Nobody wants a surprise when ... continue reading
New Windows container content on Microsoft Learn
In the past year, I have been working on improving our documentation and learning content for Windows containers – in addition to the blog posts you have seen here. Today, I wanted to spend some time on the new content ... continue reading
Tidying Up URLs: Removing Trailing Slashes in Azure Static Web Apps
Introduction In the ever-evolving digital landscape, the importance of clean, well-structured URLs cannot be overstated. A well-crafted URL not only improves user experience, but it also boosts your website's SEO ranking. One common issue web developers and content creators face ... continue reading
Wired for Hybrid – What’s New in Azure Networking – May 2023
Hello Folks, Azure Networking is the foundation of your infrastructure in Azure. Each month we bring you an update on What’s new in Azure Networking. In this blog post, we’ll cover what's new with Azure Networking in May 2023. Cross-region service ... continue reading

New macOS vulnerability, Migraine, could bypass System Integrity Protection
A new vulnerability, which we refer to as “Migraine” for its involvement with macOS migration, could allow an attacker with root access to automatically bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device. We shared ... continue reading
Cloud Management Gateway – Inbound Rule for Port 8443
Hello! My name is Nandan Sheth, and I am a part of Microsoft’s Customer Success Unit based out of Dublin, Ireland. I have been helping customers set up the Cloud Management Gateway for a few years now, but recently ... continue reading
Mastering AKS Troubleshooting #3: Kernel view and AKS Observability
This blog post concludes the three part series that addresses common networking problems that may occur while working with Azure Kubernetes Service (AKS). Although AKS is a managed container orchestration service, issues can still arise, requiring troubleshooting. The earlier ... continue reading
Empowering developers in the new Developer Center
This week at Microsoft Build, we introduced Microsoft Entra External ID, our next generation of customer identity and access management (CIAM) solution that evolves Azure AD External Identities to help developers efficiently build secure and compliant applications for customers, partners, and more ... continue reading

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Microsoft has uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States. The attack is carried out by Volt Typhoon, a state-sponsored actor based in China ... continue reading
Mastering AKS Troubleshooting #2: VNet cross-connectivity and Port resolution
This post is the second in a three-part series on troubleshooting common networking issues with Azure Kubernetes (AKS), a managed container orchestration service. Scenarios in this post were the result of an intensive one-day bootcamp specifically targeting advanced AKS networking triage ... continue reading

Build next-generation, AI-powered applications on Microsoft Azure
The potential of generative AI is much bigger than any of us can imagine today. From healthcare to manufacturing to retail to education, AI is transforming entire industries and fundamentally changing the way we live and work. At the heart ... continue reading

Introducing Microsoft Fabric: Data analytics for the era of AI
Today’s world is awash with data—ever-streaming from the devices we use, the applications we build, and the interactions we have. Organizations across every industry have harnessed this data to digitally transform and gain competitive advantages. And now, as we enter ... continue reading

Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security
At Microsoft Build 2023—an event for developers by developers—we’re going to announce exciting new features and technologies, share ideas, and help everyone boost their skills so we can all build a more secure future together. This year’s Microsoft Build offers ... continue reading
Update SC Orchestrator Exchange Admin 2022 Integration Pack v10.22.1.*
Exchange Admin 2022 Integration Pack v10.22.1.* has known issues and we strongly recommend customers to update to the latest build v10.22.2.5 that can be downloaded here. What is the issue? In SC Orchestrator, the Runbook Author role is responsible ... continue reading
How to run PowerShell scripts on Azure VMs with Terraform
The other day I published a comprehensive blog post about deploying gMSA on AKS with Terraform. As part of that blog post, I deployed an Azure VM and ran a script on it to deploy Active Directory Domain Services. Today, ... continue reading
Microsoft Build – Sessions for IT Pros
If the latest in code and application development is not your focus area of technology, you might be tempted to give the Microsoft Build conference a miss this week. But if you manage infrastructure & cloud resources, play with low-code/no-code ... continue reading
Mastering AKS Troubleshooting #1: Resolving Connectivity and DNS Failures
AKS or Azure Kubernetes Service is a fully managed Kubernetes container orchestration service that enables you to deploy, scale, and manage containerized applications easily. However, even with the most robust systems issues can arise that require troubleshooting. This blog ... continue reading

Cyber Signals: Shifting tactics fuel surge in business email compromise
Today we released the fourth edition of Cyber Signals highlighting a surge in cybercriminal activity around business email compromise (BEC). Microsoft has observed a 38 percent increase in cybercrime as a service (CaaS) targeting business email between 2019 and 2022.1 ... continue reading
Unified Update Platform with ConfigMgr – Questions from the Field
Hello everyone! I´m Stefan Röll, Cloud Solution Architect at Microsoft Germany for Intune and Microsoft Configuration Manager. In the past weeks, I got a lot of questions from customers around the recently released Unified Update Platform (UUP). In this Blog ... continue reading
PowerShellGet in PowerShell 7.4 Updates
Version 3 previews of PowerShellGet will begin shipping in PowerShell 7.4 previews in June (preview 5) with the following updates. These changes include important plans to address migration and compatibility, and we would like to request feedback. The module name ... continue reading
GA: System-preferred multifactor authentication
In previous blogs, we've emphasized the importance of multifactor authentication (MFA). Today, organizations and end users are using various authentication methods, providing varying levels of security. Users often choose less secure MFA methods, despite having access to more secure options due ... continue reading