Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Prevent and detect more identity-based attacks with Azure Active Directory

Security incidents often start with just one compromised account. Once an attacker gets their foot in the door, they can escalate privileges or gather intelligence that helps them reach their goals. This is why we say that identity is the ... continue reading

CISO Stressbusters Post #3: 3 ways to share accountability for security risk management

Jim Eckart, former Chief Information Security Officer (CISO) of The Coca-Cola Company and current Chief Security Advisor at Microsoft shares his advice for relieving stress in today’s CISO Stressbuster post. If you are a CISO, it can feel like the ... continue reading

Introducing Azure Monitor for SAP Solutions

Azure Monitor for SAP Solutions is an Azure-native monitoring solution for customers running their SAP landscapes on Azure. Syeda Persia Aziz joins Scott Hanselman to show how it collects and consolidates telemetry data from Azure infrastructure and databases at one ... continue reading
Relationship of a storage account, container, block blob, and blocks

Run high scale workloads on Blob storage with new 200 TB object sizes

Azure Blob storage is a massively scalable object storage solution that serves from small amounts to hundreds of petabytes of data per customer across a diverse set of data types, including logging, documents, media, genomics, seismic processing, and more. Read ... continue reading

The Benefits of Advanced Threat Detection in Azure SQL Database | Data Exposed: MVP Edition

One of the major benefits of Azure SQL Database is that the Azure platform provides additional protection for your database against SQL Injection attacks and Data Exfiltration, amongst other threats. In this episode, MVP Joseph D'Antoni teaches you how to ... continue reading
Microsoft Intelligent Security Association expands to include managed security service providers

Microsoft Intelligent Security Association expands to include managed security service providers

We’d planned a splashy party at Microsoft Inspire to announce our newest Microsoft Intelligent Security Association (MISA) members and introduce them to association members, but given our world today, I am instead picturing you reading this announcement curled up in ... continue reading

GitLab into Azure

Restore and deploy a complete Azure infrastructure using GitLab's CI/CD pipelines. Jump To: [00:38] What is GitLab?[02:18] Demo start[03:24] Pipelines overview[04:55] Build definitions[05:54] Runners[07:36] Pipeline output[09:00] ResultsLearn More:About GitLabGitLab DocsRunning GitLab on Microsoft AzureAzure DevOps DocsGitHub ActionsCreate a Free Azure ... continue reading
PowerShell Basics: How to Delete Microsoft Teams Cache for All Users

PowerShell Basics: How to Delete Microsoft Teams Cache for All Users

Sometimes there is a need to delete Microsoft Teams cache to quicken the adoption of an in-band policy change or simply troubleshoot an issue. The challenge here is that the cache for Microsoft Teams is in multiple directories. This can ... continue reading
Video Tutorial: Clients and Packages Behind the Scenes - Application Deployment Part 9

Video Tutorial: Clients and Packages Behind the Scenes – Application Deployment Part 9

Hello everyone, here is part 9 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 ... continue reading
An example of an alert indicating that a potential malware was uploaded to a file share.

Azure Files support and new updates in advanced threat protection for Azure Storage

A year ago we announced the general availability of advanced threat protection for Azure Storage, to help our customers better protect their data in blob containers from the growing risk of cyberattacks. Since then, advanced threat protection for Azure Storage ... continue reading
Azure AD Mailbag: Managing and reviewing exception lists more rigorously with access reviews

Azure AD Mailbag: Managing and reviewing exception lists more rigorously with access reviews

This is Sue Bohn, Partner Director of Program Management for Microsoft identity solutions. We're back with another mailbag focusing on your common questions on access reviews, an Azure Active Directory (Azure AD) identity governance feature. One of my favorite sayings ... continue reading
Azure Migrate Assessment Output

Assess your VMware workloads for a move to Azure VMware Solution with Azure Migrate

Azure Migrate first made its appearance in September 2017. Since being Generally Available in 2018 the team behind it have worked hard adding capabilities to the product that helps add organisations on that data centre migration journey. The latest feature ... continue reading
Azure Arc enabled SQL Server is now available

Az Update: Azure Arc enabled SQL, Azure File Sync Private Endpoints, and IoT Digital Twin updates

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
Video Tutorial: Distribution Points Behind the Scenes - Application Deployment Part 8

Video Tutorial: Distribution Points Behind the Scenes – Application Deployment Part 8

Hello everyone, here is part 8 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 ... continue reading

Why Azure SQL is Best for Developers (Part 2) | Data Exposed

In the second part of this two-part series, Davide Mauri and Anna Hoffman further discuss why Azure SQL is the best database in the cloud for developers, dive deeper into architectures, and review customer case studies to truly understand how ... continue reading
Screenshot of Microsoft 365 security center showing the overview tab of the Incidents view

Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents

Cybersecurity incidents are never contained to just one of your organization’s assets. Most attacks involve multiple elements across domains, including email, endpoints, identities, and applications. To rapidly understand and address incidents, your Security Operations Center (SOC) analysts need to be ... continue reading
How to move VMware workloads to Azure VMware Solution with Azure Migrate

How to move VMware workloads to Azure VMware Solution with Azure Migrate

Azure Migrate first made its appearance in September 2017. Since being Generally Available in 2018 the team behind it have worked hard adding capabilities to the product that helps add organisations on that data centre migration journey. The latest feature ... continue reading
Diagram showing X64 stage 1 address translation from virtual address to guest physical address

Introducing Kernel Data Protection, a new platform security technology for preventing data corruption

Attackers, confronted by security technologies that prevent memory corruption, like Code Integrity (CI) and Control Flow Guard (CFG), are expectedly shifting their techniques towards data corruption. Attackers use data corruption techniques to target system security policy, escalate privileges, tamper with ... continue reading
Protecting your remote workforce from application-based attacks like consent phishing

Protecting your remote workforce from application-based attacks like consent phishing

The global pandemic has dramatically shifted how people work. As a result, organizations around the world have scaled up cloud services to support collaboration and productivity from home. We’re also seeing more apps leverage Microsoft’s identity platform to ensure seamless ... continue reading
Microsoft Azure Advisor: How to Improve performance, security, and reliability of your Azure VMs

Microsoft Azure Advisor: How to Improve performance, security, and reliability of your Azure VMs

Running virtual machines in Azure is great. However, there are a lot of things you need to think about to improve performance, security, and reliability. Your cloud environment is also constantly changing, so you will need to check your Azure ... continue reading

Data Exposed + MVPs = Better together

Today, we have exciting news to share as part of the launch of joint efforts between multiple organizations in Microsoft and the MVP community. I thought it'd be interesting to take a look at how far we've come (and how ... continue reading

Demystifying ARM Templates: Parameters

In the previous episode we learn how to create resources using an Azure Resources Manager (ARM) template. However, it's was all static and defined inside the template. In this tutorial you will learn how to use parameters to make your ... continue reading
Azure Mini Fun Bytes: How to create a static web site using blob storage

Azure Mini Fun Bytes: How to create a static web site using blob storage

This week I discuss the fundamentals of Azure storage in this live session. I take you through a few real-world problems and find some solutions. We'll cover Azures Storage and solve three problems using it. How do I create a ... continue reading
Solution Architecture

COVID-19 data analytics and reporting with Azure Databricks and Azure SQL

With the evolving need to keep up with growing data volumes, increased data dependency on the business decision making process and the evolution of data platforms with Cloud Computing, enterprises have widely adopted Unified Analytics systems, Data Warehouses and Data ... continue reading
Video Tutorial: Applications behind the scenes - Application Deployment Part 7

Video Tutorial: Applications behind the scenes – Application Deployment Part 7

Hello everyone, here is part 7 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 ... continue reading
Power BI Premier Offering

Premier Offerings: An Introduction to Power BI Related Offerings

In this series of articles, we will present Premier Services Offerings around Power BI. In this first one we will succinctly present them all, but we will publish other articles to deep dive on those different offers highlighting their values ... continue reading
Az Update: Azure Firewall Manager, Azure VMware Solutions, Cost Management and more!

Az Update: Azure Firewall Manager, Azure VMware Solutions, Cost Management and more!

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
One Ops Question:  What are the common Azure Stack Hub use cases

One Ops Question: What are the common Azure Stack Hub use cases

Azure Stack Hub is an extension of Azure that provides a way to run apps in an on-premises environment and deliver Azure services in your datacenter. In this episode of One Ops Question Thomas Maurer talks about the different use ... continue reading
Video Tutorial: Packages behind the scenes - Application Deployment Part 6

Video Tutorial: Packages behind the scenes – Application Deployment Part 6

Hello everyone, here is part 6 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 ... continue reading

The world is your authentication and identity oyster

This blog post is part of the Microsoft Intelligence Security Association guest blog series. To learn more about MISA, go here. The world is your authentication/identity oyster If you’re older than 10 years of age you’ve undoubtedly heard the phrase ... continue reading