Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

PowerShell Test-NetConnection cmdlet

How to Troubleshoot Windows Server Network connectivity issues via PowerShell

We all have been there, we want to set up a new application or agent which needs network access and needs to reach an endpoint using a specific port, but it simply doesn't work. So as a server admin, we ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading

The psychology of social engineering—the “soft” side of cybercrime

Forty-eight percent of people will exchange their password for a piece of chocolate,[1] 91 percent of cyberattacks begin with a simple phish,[2] and two out of three people have experienced a tech support scam in the past 12 months.[3] What ... continue reading

Best Options for Database Migration into Azure

We often hear that customers need help determining the best option when migrating their on-premises SQL Server to Azure. See the link below to the blog and video we developed to address that question. The video will help you begin ... continue reading

Best Options for Database Migration into Azure

We often hear that customers need help determining the best option when migrating their on-premises SQL Server to Azure. See the link below to the blog and video we developed to address that question. The video will help you begin ... continue reading

Demystifying ARM Templates: Creating Your First Template

Now it's time to code. This session will introduce Visual Studio Code tools and show you how to create your first template from snippet, and how to deploy it. Learn More: Code SamplesAzure Resource Manager (ARM) ToolsDevOps Lab Favorite Links: ... continue reading
How you can contribute to Open Source Projects on GitHub

How you can contribute to Open Source Projects on GitHub

Have you ever wanted to help the community but then started to think: "It won't make a difference anyway", or "everyone knows that already...". In this blog post, I'll explain why your contribution is of great value, and how contributing ... continue reading

Video Tutorial: Client Experience 2 – Application Deployment Part 5

Hello everyone, here is part 5 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by , a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 in ... continue reading

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

With the dawn of the COVID-19 pandemic, state and federal agencies around the globe were looking at ways to modernize data intake for social services recipients. The government of a country of about 40 million citizens reached out to Microsoft ... continue reading

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

With the dawn of the COVID-19 pandemic, state and federal agencies around the globe were looking at ways to modernize data intake for social services recipients. The government of a country of about 40 million citizens reached out to Microsoft ... continue reading
1.png

Protect and Secure Cloud-based Applications using Azure MFA

Introduction In this article, we're going to talk about enabling MFA for applications that are accessed over the internet. This will force users accessing the application from the internet to authenticate with their primary credentials as well as a secondary ... continue reading

Microsoft is this week’s sponsor of Identiverse Virtual 2020

Welcome to week three of Identiverse Virtual 2020! This year, Identiverse is a series of free virtual sessions that you can attend from the comfort of your home. Microsoft is proud to sponsor this week, June 29-July 3, and join ... continue reading

Unlock your free Azure replica for SQL Server with DH2i

Are you aware that you may be entitled to a free SQL Server license in the cloud for disaster recovery? Recently-announced licensing benefits enable this scenario, and a third-party offering from DH2i can help you set up this configuration to ... continue reading

Unlock your free Azure replica for SQL Server with DH2i

Are you aware that you may be entitled to a free SQL Server license in the cloud for disaster recovery? Recently-announced licensing benefits enable this scenario, and a third-party offering from DH2i can help you set up this configuration to ... continue reading
Create an engine for business-changing insights with Azure Synapse Analytics to serve data for immediate BI and machine learning needs.

Five reasons to view this Azure Synapse Analytics virtual event

The virtual event Azure Synapse Analytics: How It Works is now available on demand. In demos and technical discussions, Microsoft customers explain how they’re using the newest Azure Synapse Analytics capabilities to deliver insights faster, bring together an entire analytics ... continue reading

Defending SMB Clients from Interception Attacks

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading

Defending SMB Clients from Interception Attacks

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading
Advancing Azure service quality with artificial intelligence: AIOps

Advancing Azure service quality with artificial intelligence: AIOps

“In the era of big data, insights collected from cloud services running at the scale of Azure quickly exceed the attention span of humans. It’s critical to identify the right steps to maintain the highest possible quality of service based ... continue reading

How do I start improving my security posture in the cloud?

A question we as Cloud Advocates get all the time, in person and online is: "how to I start improving my company's security posture in the cloud?" Dean Bryen (@deanbryen) gives you his answer. Check it out! Cheers! Pierre Roman ... continue reading

Native Commands in PowerShell – A New Approach – Part 2

In my last post I went through some some strategies for executing native executable and having them participate more fully in the PowerShell environment. In this post, I’ll be going through a couple of experiments I’ve done with the kubernetes ... continue reading
Video Tutorial: Client Experience 1 - Application Deployment Part 4

Video Tutorial: Client Experience 1 – Application Deployment Part 4

Hello everyone, here is part 4 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 ... continue reading

Data Exposed | Elastic Jobs in Azure SQL Database (Part 2)

In the second part of this two-part video series, Kate Smith discusses what two things you should understand before beginning with Azure SQL Database Elastic Jobs: Idempotence, and Credentials. We explain why they are important and how to think about ... continue reading
An image of a black male developer at work in an Enterprise office workspace.

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Threat hunting is a powerful way for the SOC to reduce organizational risk, but it’s commonly portrayed and seen as a complex and mysterious art form for deep experts only, which can be counterproductive. In this and the next blog ... continue reading

PowerShell Basics: How to check if MFA is enabled in Azure and Office 365

Security governance has been top of mind for most since the onslaught of human malware has the masses working from home. This comes with new concerns surrounding identity protection and actually proving that remote users are who they say they ... continue reading
The next frontier in machine learning 1

The next frontier in machine learning: driving responsible practices

Organizations around the world are gearing up for a future powered by artificial intelligence (AI). From supply chain systems to genomics, and from predictive maintenance to autonomous systems, every aspect of the transformation is making use of AI. This raises ... continue reading
image002.png

Endpoint Configuration Manager – Site Server High Availability

Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server Always ... continue reading
Azure Support API: Create and manage Azure support tickets programmatically

Azure Support API: Create and manage Azure support tickets programmatically

Large enterprise customers running business-critical workloads on Azure manage thousands of subscriptions and use automation for deployment and management of their Azure resources. Expert support for these customers is critical in achieving success and operational health of their business. Today, ... continue reading
An image of the effects of alert fatigue on IT staff.

Feeling fatigued? Cloud-based SIEM relieves security team burnout

Most CISOs and CSOs are worried that a growing volume of alerts is causing burnout among their teams, according to new research from IDG. You can learn about additional challenges to security operations teams by reading the IDG report SIEM ... continue reading
Customize External Identities self-service sign-up with web API integrations

Customize External Identities self-service sign-up with web API integrations

Howdy folks, Last month at Microsoft Build, we announced the public preview of Azure Active Directory (Azure AD) External Identities, introducing self-service sign-up for external users. Since then, we’ve been excited to see so many customers trying out user flows ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading