Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Ingest and analyze data at scale with existing Azure services.

New Azure for Operators solution accelerator offers a fast path to network insights

5G marks an inflection point for operators. The disaggregation of software and hardware in 5G enables operators to move telecommunication workloads to public or hybrid public/private cloud infrastructures, giving them unprecedented agility and flexibility to deliver exceptional customer experiences and ... continue reading
Ingest and analyze data at scale with existing Azure services.

New Azure for Operators solution accelerator offers a fast path to network insights

5G marks an inflection point for operators. The disaggregation of software and hardware in 5G enables operators to move telecommunication workloads to public or hybrid public/private cloud infrastructures, giving them unprecedented agility and flexibility to deliver exceptional customer experiences and ... continue reading

EPAM and Microsoft partner on data governance solutions with Microsoft Energy Data Services

This blog was co-authored by Emile Veliyev, Director, OSDU Delivery, EPAM. The energy industry creates and consumes large amounts of highly complex data for key business decisions, like where to drill the next series of wells, how to optimize production, and ... continue reading

EPAM and Microsoft partner on data governance solutions with Microsoft Energy Data Services

This blog was co-authored by Emile Veliyev, Director, OSDU Delivery, EPAM. The energy industry creates and consumes large amounts of highly complex data for key business decisions, like where to drill the next series of wells, how to optimize production, and ... continue reading
AndrewCoughlin_1-1663847922790.png

How to determine what devices are connecting to a storage account

Have you ever wondered how to determine if any devices are still using a storage account blob, file, table, or queues? In this blog post I will talk about the process of setting up monitoring to understand if/what devices are ... continue reading
A diagram of the attack chain. It presents the flow of activity from left to right, starting with the attacker gaining access to its target tenant and leading to spam messages being sent to targets.

Malicious OAuth applications used to compromise email servers and spread spam

Microsoft researchers recently investigated an attack where malicious OAuth applications were deployed on compromised cloud tenants and then used to control Exchange servers and spread spam. The investigation revealed that the threat actor launched credential stuffing attacks against high-risk accounts ... continue reading

Azure Synapse Link for SQL

Part of the SQL Server 2022 blog series.Traditionally, data to serve analytical systems have been extracted from operational data stores using custom-built extract, transform, and load (ETL) processes. These processes are often long-running, exert pressure on the source systems, and only run ... continue reading
Engineer check and control welding robotics automatic arms machine in intelligent factory automotive industrial with monitoring system software. Digital manufacturing operation.

Future-ready IoT implementations on Microsoft Azure

IoT technologies continue to evolve in power and sophistication. Enterprises are combining cloud-to-edge solutions to connect complex environments and deliver results never before imagined. In the past eight years, Azure IoT has seen significant growth across many industry sectors, including ... continue reading

Cegal and Microsoft break down data silos and offer open collaboration with Microsoft Energy Data Services

This blog post was co-authored by Espen Knudsen, Principal Digitalization and Innovation Advisor, Cegal. The vast amount of applications and data in energy companies across isolated environments is exposing inefficiencies in collaboration. Together with Cegal Cetegra, Microsoft Energy Data Services ... continue reading
SMB authentication rate limiter now on by default in Windows Insider

SMB authentication rate limiter now on by default in Windows Insider

Heya folks, Ned here again. Back in the spring of 2022 we released a new SMB preview feature: the SMB authentication rate limiter. It is available in Windows 11 Insider and Windows Server Insider builds. IT staff often enable access to the SMB server service ... continue reading
This diagram illustrates the typical infection chain of this Android malware. The infection starts from an SMS message that contains a malicious link that leads to the malicious APK.

Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices

Our analysis of a recent version of a previously reported info-stealing Android malware, delivered through an ongoing SMS campaign, demonstrates the continuous evolution of mobile threats. Masquerading as a banking rewards app, this new version has additional remote access trojan ... continue reading
Diagram explaining the threat hunting cycle.

The art and science behind Microsoft threat hunting: Part 2

We discussed Microsoft Detection and Response Team’s (DART) threat hunting principles in part 1 of The art and science behind Microsoft threat hunting blog series. In this follow-up post, we will talk about some general hunting strategies, frameworks, tools, and ... continue reading

Azure Payment HSM achieves PCI PIN certification offering customers secure digital payments solutions in the cloud

This blog post has been co-authored by Darius Ryals, General Manager of Partner Promises and Azure Chief Information Security Officer. Today we’re announcing Azure Payment HSM has achieved Payment Card Industry Personal Identification Number (PCI PIN) making Azure the first hyperscale ... continue reading

New Windows 11 security features are designed for hybrid work

Attackers are constantly evolving, becoming increasingly sophisticated and destructive—the median time for an attacker to access your private data if you fall victim to a phishing email is 1 hour, 12 minutes.1 Microsoft tracks more than 35 ransomware families and ... continue reading

PowerShell Registry Monitor

Recently, while discussing work-related topics, a co-worker asked me if there is a way of monitoring changes on a Windows registry key. I knew we can monitor files, with the System.IO.FileSystemWatcher .NET class, but never heard of registry monitoring. Well, ... continue reading
Example PBI Dashboard

Wipro and Microsoft partner on services and accelerators for the new Microsoft Energy Data Services

This blog post was co-authored by Paul Dejager, OSDU Practice Lead, Wipro. Since its first customer-ready release, the OSDU™ Data Platform has been tested and piloted within the energy industry with great success. However, customers have been awaiting an enterprise-ready ... continue reading
wernerrall_0-1661515761677.png

Create Azure Service Health Alerts for All Resource Groups

Introduction I recently had a customer requirement for creating Azure Service Health Alerts. The way access was provided in Azure, meant that only specific users had access to their respective Resource Groups. We also did not want these users to ... continue reading
Balance Performance in MsQuic and XDP

Balance Performance in MsQuic and XDP

Improving performance has always been a major goal for MsQuic. Recently, we have put in a lot of effort into getting ultra-low latency with MsQuic. We have prototyped a fully functioning XDP data path for MsQuic to bypass Windows TCP/IP ... continue reading
Preview for verified coupons with Entra Verified ID

Preview for verified coupons with Entra Verified ID

Hello! It’s been just over 30 days since Entra Verified ID became Generally Available (GA). I’m thrilled to share with you our latest update, developed by Emilia Borisova this summer: Verified Coupons (e.g., a ticket for an exclusive event).   Thanks, ... continue reading

Test your team’s security readiness with the Gone Phishing Tournament

Why should you care about the behavioral risk of your employees? Eighty-two percent of breaches include (and often start with) user behavior.1 Not all are phishing, but a majority of them are just that. Phishing is, and has been for ... continue reading
TBD

Intelligent Query Processing: feature family additions

Part of the SQL Server 2022 blog series.SQL Server 2022 introduces a handful of new members to the growing Intelligent Query Processing (IQP) family. These additions range from expanding and improving various query performance feedback mechanisms to adding two new featuresparameter ... continue reading
Guidance for technical architecture relating to Microsoft Zero Trust Principles.

Implementing a Zero Trust strategy after compromise recovery

After the final compromise recovery, steps have been completed and we are back in control. There has been a round of applause and many sighs of relief.  Now what? Is everything going back to as it was in the past? ... continue reading
Placeholder

Microsoft shares what’s next in machine learning at NVIDIA GTC

Finding scalable solutions for today’s global challenges requires forward-thinking, transformative tools. As environmental, economic, and public health concerns mount, Microsoft Azure is addressing these challenges head on with high-performance computing (HPC), AI, and machine learning. The behind-the-scenes power for everything ... continue reading
Abstract Satellite demonstrating the connection to the cloud through Space.

New Azure Space products enable digital resiliency and empower the industry

Since the launch of Azure Space two years ago, we’ve announced partnerships, products, and tools that have focused on how we can bring together the power of the cloud with the possibilities of space. Today, we are introducing the next ... continue reading
Two graphs showing that 39 percent of incidents were detected by Microsoft Defender for Cloud, while 23 percent were detected by Microsoft Sentinel.

Secure your endpoints with Transparity and Microsoft

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  Endpoint protection platforms (EPPs) are dead and no longer sufficient to protect your organization, right? Wrong. When it comes to cybersecurity, the ... continue reading
Using WSL 2 on Windows Server 2022 to run Linux containers

Using WSL 2 on Windows Server 2022 to run Linux containers

Windows Subsystem for Linux 2 (WSL 2) is one of the most popular features for developers on Windows 10 and 11. It has recently been made available on Windows Server 2022. With this addition, you can now run Linux containers ... continue reading
The university and laboratory staff played an important role in the process of administering tests and obtaining timely results to control infections.

Azure API for FHIR and Microsoft’s Power Platform help universities tackle COVID-19

When summer 2021 ended, many organizations faced the formidable challenge of how to return to their places of work and school safely. Tuskegee University (Tuskegee) was one of them—not only was the safe return of students and faculty to school a priority ... continue reading
PaC-Deploy-Scripts.png

Azure Enterprise Policy as Code – A New Approach

We work closely with customers using Azure Policy and have seen many different methods of deploying and maintaining it, from manual to over-complicated automated methods, everyone has a unique way of doing it. This code was developed to make policy ... continue reading

Breaking Change notice: Upgrade to latest version of Operations Manager agent (MMA) by 1 Nov 2022

On 1 November 2022, Azure will no longer accept connections from older versions of the Operations Manager agent, also known as the Microsoft Monitoring Agent (MMA), that use SSL V1. If Operations Manager agent is setup to send data to Log ... continue reading

Breaking Change notice: Upgrade to latest version of Operations Manager agent (MMA) by 1 Nov 2022

On 1 November 2022, Azure will no longer accept connections from older versions of the Operations Manager agent, also known as the Microsoft Monitoring Agent (MMA), that use SSL V1. If Operations Manager agent is setup to send data to Log ... continue reading