Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Network ATC on Azure Stack HCI

Network ATC on Azure Stack HCI

Update: Network ATC is now publicly available with Azure Stack HCI 21H2 As you may be aware, Microsoft announced the general availability of the Azure-connected Hyper-Converged Infrastructure, Azure Stack HCI. Previously Azure Stack HCI was built off Windows Server which ... continue reading
Secure authentication method provisioning with Temporary Access Pass

Secure authentication method provisioning with Temporary Access Pass

Howdy folks, I’m happy to announce the general availability of Temporary Access Pass (TAP). We’ve made a lot of progress since we announced the public preview of TAP. “…We use the MS Authenticator for passwordless sign in. That is the ... continue reading

Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog ... continue reading
Satellite Rendering from NOAA-18.

Azure Orbital Ground Station as Service extends life and reduces costs for satellite operators

How can Microsoft empower satellite operators to focus on their mission and enable them to continue the operation of their satellites, without making capital investments in their ground infrastructure? To answer that question, Microsoft worked alongside the National Oceanic and ... continue reading

Microsoft Defender for Office 365 receives highest award in SE Labs Enterprise Email Security Services test

In today’s evolving threat landscape, email represents the primary attack vector for cybercrime, making effective email protection a key component of any security strategy.1 In Q1 2022, Microsoft participated in an evaluation of email security solutions, carried out by SE ... continue reading
Integration of two modules represented by two circles overlapping in the center.

MLOPs Blog Series Part 2: Testing robustness of secure machine learning systems using machine learning ops

Robustness is the ability of a closed-loop system to tolerate perturbations or anomalies while system parameters are varied over a wide range. There are three essential tests to ensure that the machine learning system is robust in the production environments: ... continue reading
goyalaayush_0-1655881265366.png

Workflow Analyzer V2 Release

Workflow Analyzer V2 Download Link : Download Microsoft System Center Management Pack Tools from Official Microsoft Download Center Additional Links : Workflow Analyzer (v2) for SCOM - The Monitoring Guys After a resounding success of v1 (released in March 2021), ... continue reading
Line chart illustrating how Defender for Endpoint detected and incriminated a ransomware attack when attackers had encrypted files on 3.9% of the organization’s devices.

Improving AI-based defenses to disrupt human-operated ransomware

Microsoft’s deep understanding of human-operated ransomware attacks, which are powered by a thriving cybercrime gig economy, continuously informs the solutions we deliver to protect customers. Our expert monitoring of threat actors, investigations into real-world ransomware attacks, and the intelligence we ... continue reading

See how 3 industry-leading companies are driving innovation in a new episode of Inside Azure for IT

I had the awesome opportunity to talk with a few people innovating with some of the most exciting next-generation tech in our latest episode of the Inside Azure for IT fireside chat series. Many of us, myself included, spend a ... continue reading
Azure Blog AI

Responsible AI investments and safeguards for facial recognition

A core priority for the Cognitive Services team is to ensure its AI technology, including facial recognition, is developed and used responsibly. While we have adopted six essential principles to guide our work in AI more broadly, we recognized early ... continue reading
Asus logo

Securing your IoT with Edge Secured-core devices

A recent study conducted by Microsoft in partnership with Ponemon Institute included a survey of companies that have adopted IoT solutions and 65 percent of them mentioned that security is a top priority when implementing IoT. Attacks targeting IoT devices ... continue reading

Azure IoT increases enterprise-level intelligent edge and cloud capabilities

For Microsoft Azure IoT, our approach is connecting devices at the edge to the cloud seamlessly and securely to help customers achieve desired business outcomes. At this year’s Embedded World 2022, we’ll share how our Azure IoT solutions are delivering ... continue reading
A screenshot of the Backup via URL GUI on Azure Data Studio.

What’s new with SQL Tools

Hello community, the June release of Azure Data Studio 1.37 is here! We are also excited to announce the release of SQL Server Management Studio (SSMS) 18.12. In this Azure Data Studio release, backup and restore to URL was introduced ... continue reading
Learn Microsoft Azure for system administrators & solution architects with Azure Skills Navigator

Learn Microsoft Azure for system administrators & solution architects with Azure Skills Navigator

If you’re wanting to learn the foundations of Microsoft Azure (including cloud computing concepts, Azure’s structure, and its product range), you might start out with training materials like the Azure Fundamental learning paths on Microsoft Learn. These will also give ... continue reading
Default site boundary group behavior to support cloud source selection

Default site boundary group behavior to support cloud source selection

You can now add options via PowerShell to include and prefer cloud management gateway (CMG) management points for the default site boundary group. When a site is set up, there's a default site boundary group created for each site and ... continue reading

Why strong security solutions are critical to privacy protection

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Voice of the Community blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Ann ... continue reading
Image of object explorer for SQL Server Management Studio 19 connected to SQL Server 2022.

Recapping recent updates to client tools in SQL Server

Hello from the SQL Experiences team! As a follow-up to Microsoft Build at the end of May, we thought it was a good time to highlight recent updates for client tools, as we've had quite a few.First, in alignment with ... continue reading
Associating a WAF policy to an Azure Front Door

Simplify and centralize network security management with Azure Firewall Manager

We are excited to share that Azure Web Application Firewall (WAF) policy and Azure DDoS Protection plan management in Microsoft Azure Firewall Manager is now generally available. With an increasing need to secure cloud deployments through a Zero Trust approach, ... continue reading
Azure Arc is a set of technologies from Microsoft that is a bridge that extends the Azure platform so customers can build applications and services with the flexibility to run across datacenters, edge, and multicloud environments.

Discover how you can innovate anywhere with Azure Arc

Welcome to Azure Hybrid, Multicloud, and Edge Day—please join us for the digital event. Today, we’re sharing how Azure Arc extends Azure platform capabilities to datacenters, edge, and multicloud environments through an impactful, 90-minute lineup of keynotes, breakouts, and technical ... continue reading
Logs with time stamps showing start and completion of the core network deployment.

Azure powers rapid deployment of private 4G and 5G networks

As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading
Logs with time stamps showing start and completion of the core network deployment.

Azure powers rapid deployment of private 4G and 5G networks

As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading
Graphic model defining and illustrating MLOPs, the marriage of machine learning and devops, which shows the components, stages, tasks and flow of how the process functions.

MLOps Blog Series Part 1: The art of testing machine learning systems using MLOps

Testing is an important exercise in the life cycle of developing a machine learning system to ensure high-quality operations. We use tests to confirm that something functions as it should. Once tests are created, we can run them automatically whenever ... continue reading
Screenshot of BlackCat ransomware deployment options and subcommands with corresponding descriptions.

The many lives of BlackCat ransomware

The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy. It’s noteworthy due to its unconventional programming language (Rust), multiple target devices and possible entry points, and affiliation ... continue reading
hspinto_0-1654852954197.png

Azure DDoS Protection Standard Costs Estimation

If you are considering the activation of Azure DDoS Protection Standard – a great solution to better protect your Azure Virtual Network (VNet) resources from DDoS attacks – you may ask yourself: Which VNet(s) should you enable the service in? ... continue reading

Supporting openEHR with Azure Health Data Services

This blog post is co-authored by Trent Norris, Cloud and Data Partner Alliances, HLS. This blog is part of a series in collaboration with our partners and customers leveraging the newly announced Azure Health Data Services. Azure Health Data Services, ... continue reading
Managing, governing, and securing identities for apps and services

Managing, governing, and securing identities for apps and services

Hi everyone, When we talk to customers, we often get to dig deep into the details of marquee Azure Active Directory (Azure AD) features like conditional access, identity protection, and identity governance to secure user population. We know that for ... continue reading
Marketplace listing page for Dynatrace native service for Azure.

Achieve seamless observability with Dynatrace for Azure

This blog post has been co-authored by Manju Ramanathpura, Principal Group PM, Azure DevEx & Partner Ecosystem. As adoption of public cloud grows by leaps and bounds, organizations want to leverage software and services that they love and are familiar ... continue reading
Intrusion Detection and Prevention System signatures table

Learn what’s new in Azure Firewall

This post was co-authored by Suren Jamiyanaa, Program Manager 2, Azure Networking. We continue to be amazed by the adoption, interest, positive feedback, and the breadth of use cases customers are finding for our service. Today, we are happy to ... continue reading

Find the clarity and guidance you need to realize cloud value

A modernized cloud workload offers significant benefits—including cost savings, optimized security and management, and opportunities for ongoing innovation. But the process of migrating and modernizing workloads can be challenging. That’s why it’s essential to prepare and plan ahead—and to ensure ... continue reading

SCOM MP for M365 – V3 CTP

We are back with the latest version (in CTP) of M365 MP and have very exciting changes to talk about. With this update, Users can now opt between their choice of MP Authentication i.e., Application (which is available currently), Delegated ... continue reading