Microsoft Cloud Library
Articles about Microsoft Cloud
Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.
Select a Topic to view articles of just that Topic. Select All to view the entire library.
Check This Out! (CTO!) Guide (May 2023)
Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are trying ... continue reading
SMB signing required by default in Windows Insider
Heya folks, Ned here again. Beginning in Windows 11 Insider Preview Build 25381 (Canary, zn_release) Enterprise editions, SMB signing is now required by default for all connections. This changes legacy behavior, where Windows 10 and 11 required SMB signing by ... continue reading
Network Design Guide for Azure VMware Solution
I have previously talked about Azure VMware Solution Landing Zone Accelerator (AVS LZ) and the automation tools in my previous blog post. This open-source solution provides an architectural approach and reference implementation to prepare Azure landing zone subscriptions for a scalable ... continue reading

XDR meets IAM: Comprehensive identity threat detection and response with Microsoft
Identity has become the corporate security perimeter. The average organization used 130 different cloud applications in 2022. That’s up 18 percent from 2021 alone.1 And as organizations continue to embrace digital transformation and enable remote work, they look to identity ... continue reading
New Windows container content on Microsoft Learn
In the past year, I have been working on improving our documentation and learning content for Windows containers – in addition to the blog posts you have seen here. Today, I wanted to spend some time on the new content ... continue reading
Tidying Up URLs: Removing Trailing Slashes in Azure Static Web Apps
Introduction In the ever-evolving digital landscape, the importance of clean, well-structured URLs cannot be overstated. A well-crafted URL not only improves user experience, but it also boosts your website's SEO ranking. One common issue web developers and content creators face ... continue reading
Wired for Hybrid – What’s New in Azure Networking – May 2023
Hello Folks, Azure Networking is the foundation of your infrastructure in Azure. Each month we bring you an update on What’s new in Azure Networking. In this blog post, we’ll cover what's new with Azure Networking in May 2023. Cross-region service ... continue reading

New macOS vulnerability, Migraine, could bypass System Integrity Protection
A new vulnerability, which we refer to as “Migraine” for its involvement with macOS migration, could allow an attacker with root access to automatically bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device. We shared ... continue reading
Cloud Management Gateway – Inbound Rule for Port 8443
Hello! My name is Nandan Sheth, and I am a part of Microsoft’s Customer Success Unit based out of Dublin, Ireland. I have been helping customers set up the Cloud Management Gateway for a few years now, but recently ... continue reading
Mastering AKS Troubleshooting #3: Kernel view and AKS Observability
This blog post concludes the three part series that addresses common networking problems that may occur while working with Azure Kubernetes Service (AKS). Although AKS is a managed container orchestration service, issues can still arise, requiring troubleshooting. The earlier ... continue reading
Empowering developers in the new Developer Center
This week at Microsoft Build, we introduced Microsoft Entra External ID, our next generation of customer identity and access management (CIAM) solution that evolves Azure AD External Identities to help developers efficiently build secure and compliant applications for customers, partners, and more ... continue reading

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Microsoft has uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States. The attack is carried out by Volt Typhoon, a state-sponsored actor based in China ... continue reading
Mastering AKS Troubleshooting #2: VNet cross-connectivity and Port resolution
This post is the second in a three-part series on troubleshooting common networking issues with Azure Kubernetes (AKS), a managed container orchestration service. Scenarios in this post were the result of an intensive one-day bootcamp specifically targeting advanced AKS networking triage ... continue reading

Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security
At Microsoft Build 2023—an event for developers by developers—we’re going to announce exciting new features and technologies, share ideas, and help everyone boost their skills so we can all build a more secure future together. This year’s Microsoft Build offers ... continue reading
Update SC Orchestrator Exchange Admin 2022 Integration Pack v10.22.1.*
Exchange Admin 2022 Integration Pack v10.22.1.* has known issues and we strongly recommend customers to update to the latest build v10.22.2.5 that can be downloaded here. What is the issue? In SC Orchestrator, the Runbook Author role is responsible ... continue reading
How to run PowerShell scripts on Azure VMs with Terraform
The other day I published a comprehensive blog post about deploying gMSA on AKS with Terraform. As part of that blog post, I deployed an Azure VM and ran a script on it to deploy Active Directory Domain Services. Today, ... continue reading
Microsoft Build – Sessions for IT Pros
If the latest in code and application development is not your focus area of technology, you might be tempted to give the Microsoft Build conference a miss this week. But if you manage infrastructure & cloud resources, play with low-code/no-code ... continue reading
Mastering AKS Troubleshooting #1: Resolving Connectivity and DNS Failures
AKS or Azure Kubernetes Service is a fully managed Kubernetes container orchestration service that enables you to deploy, scale, and manage containerized applications easily. However, even with the most robust systems issues can arise that require troubleshooting. This blog ... continue reading

Cyber Signals: Shifting tactics fuel surge in business email compromise
Today we released the fourth edition of Cyber Signals highlighting a surge in cybercriminal activity around business email compromise (BEC). Microsoft has observed a 38 percent increase in cybercrime as a service (CaaS) targeting business email between 2019 and 2022.1 ... continue reading
Unified Update Platform with ConfigMgr – Questions from the Field
Hello everyone! I´m Stefan Röll, Cloud Solution Architect at Microsoft Germany for Intune and Microsoft Configuration Manager. In the past weeks, I got a lot of questions from customers around the recently released Unified Update Platform (UUP). In this Blog ... continue reading
PowerShellGet in PowerShell 7.4 Updates
Version 3 previews of PowerShellGet will begin shipping in PowerShell 7.4 previews in June (preview 5) with the following updates. These changes include important plans to address migration and compatibility, and we would like to request feedback. The module name ... continue reading
GA: System-preferred multifactor authentication
In previous blogs, we've emphasized the importance of multifactor authentication (MFA). Today, organizations and end users are using various authentication methods, providing varying levels of security. Users often choose less secure MFA methods, despite having access to more secure options due ... continue reading
Build reports faster with Azure Resource Graph
Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. If you are hands-on with Azure operations, I’m sure at some point you have been asked to provide some type of report containing information about your ... continue reading
Measuring script execution time
Most of the time while developing PowerShell scripts we don’t need to worry about performance, or execution time. After all, scripts were made to run automation in the background. However, as your scripts become more sophisticated, and you need to ... continue reading
Azure Cost Management Dashboard
Author introduction Hi, I am Saira Shaik, Working Principal customer success account manager at Microsoft India. I created this Dashboard to display the units consumed and the respective cost for Selected filters. This Dashboard will be helpful for ... continue reading
Modernizing Authentication Management
We’re thrilled to announce two key updates to how you manage your authentication experiences! The General Availability of Converged Authentication Methods and Public Preview of a modernized version of multifactor authentication (MFA) Fraud Alert. The General Availability of Converged ... continue reading

Porting System.Web.Security.Membership.GeneratePassword() to PowerShell
I’ve been using PowerShell (core) for a couple of years now, and it became natural to create automations with all the features that are not present in Windows PowerShell. However, there is still one feature I miss in PowerShell, and ... continue reading
Azure Savings Dashboard
Author introduction Hi, I am Saira Shaik, Working Principal customer success account manager as Microsoft India. I have created this dashboard to display the savings made due to the purchase of Reservations or Savings Plans or by signing the ... continue reading
How to deploy gMSA on AKS with Terraform
The other day I posted a blog on how to deploy an AKS cluster that is ready for Windows workloads using Terraform. Today, I wanted to expand that to include gMSA, which is a highly requested feature from Windows customers ... continue reading

How Microsoft can help you go passwordless this World Password Day
It’s that time of year again. World Password Day is May 4, 2023.1 There’s a reason it’s still going strong 10 years after being created by cybersecurity professionals. A recent study that analyzed more than 15 billion passwords found that ... continue reading