Microsoft Cloud Library
Articles about Microsoft Cloud
Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.
Select a Topic to view articles of just that Topic. Select All to view the entire library.
What to use for monitoring your applications in Azure
Knowing how your application is doing is vital to keep your users happy. In Azure, there are many services that can help you with this. In this episode, Azure Barry shows Scott Hanselman how to choose the right Azure service ... continue reading
10 Reasons to Love Passwordless #10: Never use a password
In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Pamela Dingle closes the series with a post about the tighter security of passwordless authentication. Here we are at the last ... continue reading
What to use for deploying and testing your applications in Azure
Friends don't let friends right-click deploy. Azure provides many ways to deploy your application. In this episode, Azure Barry shows Scott Hanselman how to choose the right Azure service with which to deploy and test your app.[0:00:00]– Introduction[0:01:23]– Continuous Integration ... continue reading
MEM – All Things About USB Drive Management and Troubleshooting
Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading

A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security
Today’s business uses an average of 1,180 cloud apps¹, with many of those organizations securing their apps through cloud access security brokers (CASB). The organizational need for a CASB has grown alongside the use of cloud apps to enable remote ... continue reading

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence
Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
Windows Admin Center Capabilities
Windows Admin Center is a tool I wish I had had when I was managing servers. When the tool was first announced in 2017 under the name Project “Honolulu”, I was intrigued. I was working for a managed service provider ... continue reading

XLM + AMSI: New runtime defense against Excel 4.0 macro malware
We have recently expanded the integration of Antimalware Scan Interface (AMSI) with Office 365 to include the runtime scanning of Excel 4.0 (XLM) macros, to help antivirus solutions tackle the increase in attacks that use malicious XLM macros. This integration, ... continue reading
10 Reasons to Love Passwordless #9: Onboard without a password
In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Alex Weinert continues the series with this post in which he describes how much customers are going to benefit from Temporary ... continue reading

Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell
AksHci PowerShell February Release If you were one of many people who gave us feedback on our December release, we have exciting news for you! In our February release, we’ve delivered one of the most requested features, additional networking options! ... continue reading
Compliance joins Microsoft Intelligent Security Association (MISA)
Like many of you, I’m thrilled to have my 2020 calendar safely in the recycling pile. During that time though, you too might have noticed how, perhaps unknowingly, you were able to turn some of last year’s lemons into lemonade ... continue reading
Secure your Infrastructure Monitoring with SCOM
Recent high profile cyberattacks have highlighted the importance of having strong standards and features built into infrastructure monitoring and management tools. Microsoft System Center Operations Manager (SCOM) offers world class monitoring capabilities and includes powerful built-in security features. Our increased ... continue reading
Azure Unblogged – Azure Arc Jumpstart Project
In this episode of Azure Unblogged, @thomasmaurer speaks with @liorkamrat about the Azure Arc Jumpstart project. The Azure Arc Jumpstart project is designed to provide a "zero to hero" experience so you can start working with Azure Arc right away!With ... continue reading
Microsoft 365 Defender Incident Overview
Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will go over the Microsoft 365 Defender Security Portal and go into detail of the incident ... continue reading

HAFNIUM targeting Exchange Servers with 0-day exploits
Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to ... continue reading
10 Reasons to Love Passwordless #7: Authenticator app for easy phone sign-in
In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Alex Weinert continues this series. In previous blogs in this series, we shared how passwords lead to breaches, lost productivity ... continue reading
PowerShell Team 2021 Investments
The PowerShell Team plans engineering work per semester (6 months at a time). However, PowerShell itself follows the .NET schedule of release every year. In this blog post, we’ll cover the year long plan for PowerShell 7.2 as well as ... continue reading
Azure Blueprints vs Azure Resource Manager template specs
Hello folks, I’ve had a few conversations lately with IT pros and operations folks that made me think that there may be a disconnect or some confusion about the role of Azure blueprints and ARM templates specs. There were comments ... continue reading

Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work
We’re now a year into our new reality, and two trends stand out. First, people need even more flexibility as we work, learn, and collaborate in a world without perimeters. And second, bad actors are getting even more sophisticated. They’re ... continue reading

Microsoft brings advanced hardware security to Server and Edge with Secured-core
A cursory look at recent headlines reveals two clear trends. First, organizations around the world are embracing digital transformation using technologies across cloud and edge computing to better serve their customers and thrive in fast-paced environments. Second, attackers are constantly ... continue reading
4 ways Microsoft is delivering security for all in a Zero Trust world
If there’s one thing the dawning of 2021 has shown, it’s that security isn’t getting any easier. Recent high-profile breach activity has underscored the growing sophistication of today’s threat actors and the complexity of managing business risk in an increasingly ... continue reading

Microsoft unifies SIEM and XDR to help stop advanced attacks
For all of us in security, the last twelve months have been an incredible series of challenges—from balancing remote work with family priorities, to helping build resilient businesses, and protecting against the latest attacks. 2020 showed us that while we ... continue reading
Securing and governing data in a new hybrid work reality
The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading
Moving work items around using the Azure DevOps Migration Tools
In this episode, Abel and Martin will talk about moving Work Item data between Collections, Organizations, and Projects in Azure DevOps and TFS using the Migration Tools. Jump to:[04:44] Where to find the Migration Tools[06:33] Configuring the Migration Tools[11:25] Running ... continue reading
Top 5 things to get the most out of Microsoft Ignite
We’re one day away from the kick off of Microsoft Ignite digital experience taking place March 2nd-4th starting at 8am PST. I thought it would be a good idea to share some special insights on how to get the most ... continue reading
10 Reasons to Love Passwordless #8: You won’t get phished!
In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Maria Puertas Calvo, data scientist for Microsoft Identity, continues the series. Hi! I am honored to be among such a ... continue reading
Troubleshoot AKS cluster issues with AKS Diagnostics and AKS Periscope
Yun Jung Choi shows Scott Hanselman how to use AKS Diagnostics and AKS Periscope to troubleshoot issues on your AKS cluster. Use AKS Diagnostics to identify problems and get actionable recommendations on how to resolve AKS cluster issues. Run AKS ... continue reading
Autoscale applications on Kubernetes with Kubernetes Event-Driven Autoscaling (KEDA)
Do you want to scale your workloads on Kubernetes without having to worry about the details? Do you want to run Azure Functions anywhere and easily scale it yourself? Tom Kerkhove shows Scott Hanselman how Kubernetes Event-Driven Autoscaling (KEDA) makes ... continue reading
Enable Application Setups to Change File Type Associations
Tested with Windows 10 1609 up to 20H2 Hey community, this is Helmut Wagensonner, a Customer Engineer for Windows Client platform. Today I show you a way to make file type associations more enterprise ready. I heard many of my ... continue reading
Task Sequence Bootstrapping – OSD Video Tutorial: Part 26
Hi everyone, we have added a new video tutorial to the Advanced OSD series. This tutorial highlights the ability to bootstrap a task sequence during client installation. This was introduced in ConfigMgr current branch 2002 and refined in ConfigMgr current ... continue reading