Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Speakers_Blog_sarah_young_jeff_woosley_ned_pyle_matt_mcspirit.png

Periscope up – what's on the horizon for hybrid event

Now we let the cat out of the bag that we’re putting on an event on Feb 2nd, 2021 – it’s time to go a little deeper. How about some information about the AWESOME content we have lined up that ... continue reading
SmartScreen.gif

Windows Defender SmartScreen – File and Flash Player blockage problem.

SmartScreen has become a part of Windows 10 OS, it was named as Windows Defender SmartScreen. It is useful to protect not just Edge, Internet Explorer browsers but also other applications such as third-party browsers, Email Client and Apps from ... continue reading
Naveen_Kanneganti_0-1610737735456.png

Configuration Manager – Collect Client Logs

Hi Folks! I am Naveen kanneganti and welcome to my blog post. You can now send client notification action from the Configuration Manager to trigger a client device to upload its client logs to the site server. In order access ... continue reading
shows the Shared responsibility model

Simplify compliance and manage risk with Microsoft Compliance Manager

The cost of non-compliance is more than twice that of compliance costs. Non-compliance with the ever-increasing and changing regulatory requirements can have a significant impact on your organization’s brand, reputation, and revenue. According to a study by the Ponemon Institute and Globalscape, ... continue reading
Diagram of high-level Solorigate attack chain

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

­Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading
HITRUST is an organization governed by representatives from the healthcare industry and maintains the common security framework (CSF) to help healthcare organizations demonstrate their security and compliance.

Azure and HITRUST publish shared responsibility matrix

Healthcare solutions offered in the cloud are drawing unprecedented attention today with the ongoing global pandemic and the accompanying need for social distancing. Microsoft has been on the forefront of empowering health organizations to leverage the power of the cloud ... continue reading

Ten things you can implement to save costs in your Azure environment

Managing costs is a skillset that we need to learn when managing resources in the cloud, it is a change from running your resources on-premises. Managing costs can feel a bit overwhelming but it should be a team job, folks ... continue reading

Continuous Monitoring for Web Perf and Accessibility

Learn how the Azure Cloud Collaboration Center (CCC) visualization team continuously monitors a Web App for Performance and Accessibility using open-source tools Lighthouse API for perf and Axe-Core for accessibility and Azure DevOps pipelines to prevent perf regressions and common ... continue reading
front-line-2-1024x843.png

Empower your frontline workers with these Azure AD capabilities that just went GA

Howdy folks - (Cross-posting just to make sure you don't miss the big news.) Today we turned on the GA release of our new features for Frontline workers and Frontline managers. You can learn all about it over on the ... continue reading
Delegated user management in the My Staff portal

Azure Active Directory empowers frontline workers with simplified and secure access

Howdy folks, The past year has shown us all just how critical frontline workers are to our communities and our economy. They’re the people behind the counter, in the call centers, in hospital ICUs, on the supermarket floor—doing the critical ... continue reading
msresource.jpg

Orphaned Start Menu Apps Workaround

Hey community, this is Helmut Wagensonner, a Customer Engineer for Windows Client platform. Today I want to provide you a workaround for an issue I ran into a couple of times now at my customers. Please note that at the ... continue reading
ModInfra_Team_Binary.png

Let's try something different – ITOps Talks Hybrid Event

As a team who (used to) regularly speak at conferences or while creating engaging online technical content for various platforms – we thought we’d try something a little different. Talking with folks online to collect their feedback and taking stock ... continue reading

Project Bicep – Next generation ARM Templates

In this video, we'll go over the what, why, and how of Project Bicep and how it's going to make deploying infrastructure to Azure even easier. We'll go over the basics of what makes Bicep useful, as well as show ... continue reading
Azure Arc Hybrid Cloud Management Control Plane

How to manage your Hybrid Cloud environment with Azure Arc (Video)

In this Azure Arc video, I want to share the latest Azure Arc hybrid cloud management capabilities. Hybrid Cloud management becomes more and more important for many customers. We are seeing the customers taking advantage of cloud computing, but at ... continue reading

Azure SQL Database named among the top 3 databases of 2020

We are excited to share that Azure SQL Database is among the most popular databases of 2020 according to DB-Engines, who recently announced their DBMS of the Year award. DB-Engines collects information on database management systems and it provides a ... continue reading

Azure SQL Database named among the top 3 databases of 2020

We are excited to share that Azure SQL Database is among the most popular databases of 2020 according to DB-Engines, who recently announced their DBMS of the Year award. DB-Engines collects information on database management systems and it provides a ... continue reading

New Surface PCs enable virtualization-based security (VBS) by default to empower customers to do more, securely

VBS and HVCI-enabled devices help protect from advanced attacks Escalation of privilege attacks are a malicious actor’s best friend, and they often target sensitive information stored in memory. These kinds of attacks can turn a minor user mode compromise into ... continue reading
Pic1

App Registration Expiration Monitoring and Notifications

Problem Statement Azure services do not have a native feature to report on expiring App registrations. Without a solution in place to monitor and notify on expiration of these SPN’s solutions ranging from Custom Apps, and DevOps CICD Pipelines too ... continue reading
Azure Virtual Networks add dialog

Configuring Azure virtual network subnets with CIDR notation

For people new to networking, creating Azure Virtual Network subnets can be tricky. Learn how CIDR notation works to segment ranges of IP addresses. When you create an Azure virtual network, you'll get default IP addresses that look something like ... continue reading
Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!

Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!

If you are considering deploying your own Microsoft SQL Server instances in AWS EC2 you have some decisions to make regarding the resiliency of the solution. Sure, AWS will offer you a 99.99% SLA on your Compute resources if you ... continue reading
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of customer or employee personal information, they must report it within the required time frame. The size and scope ... continue reading

Preparing to Manage Windows Virtual Desktops (WVD)

Technologies such as Intune and Endpoint Configuration Manager (used manage enterprise devices) are becoming more robust, and these tools can also now be used for virtual devices such as those used by Microsoft’s Windows Virtual Desktop service in Azure. As ... continue reading

The dynamic duo: How to build a red and blue team to strengthen your cybersecurity, Part 1

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the first post of our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks with Jake Williams, ... continue reading
High Level Port flow.jpg

Troubleshooting Third Party Updates in MEM CM Hierarchy

The intention of this blog is not to go into the details of every aspect of third party patching feature in MEM CM as that is covered in a lot of blogs and our own documentation itself - Enable third ... continue reading
integrated solutions combine the risk score calculated by Forcepoint’s CASB - with Azure AD- to apply the appropriate conditional access policies tailored to each individual user risk.

Forcepoint and Microsoft: Risk-based access control for the remote workforce

This blog post is part of the Microsoft Intelligence Security Association (MISA) guest blog series. Learn more about MISA here. Adopting cloud-based services as part of an organization’s digital transformation strategy is no longer optional, it’s a necessity. Last year, only ... continue reading
Nicole, a marketing consultant to Woodgrove Bank, accesses Woodgrove resources by verifying her email address.

Collaborate with anyone in any organization with any email address!

Howdy folks, We’ve heard from you that interconnected supply and distribution chains, and vendor models are bringing B2B partners directly into your business, where secure and seamless collaboration is more important than ever. We also know how painful it can ... continue reading
bwatts670_0-1609251304773.jpeg

Detecting Azure Cost Anomalies

Brad Watts here to talk about a solution that I’ve implemented with several organizations in my role as a CSA. Azure Cost Management is a powerful way to visualize and report on your Azure spend but it doesn’t currently give ... continue reading
Azure Sentinel Analytics menu

Azure Sentinel: Using rule templates

Microsoft's Azure Sentinel, our Security Incident and Event Management (SIEM) solution, enables you to connect activity data from different sources into a shared workspace. That data ingestion is just the first step in the process though. The power comes from ... continue reading
Diagram of solution overview for the just-in-time inventory.

4 common analytics scenarios to build business agility

Azure Synapse Analytics is a limitless analytics service that is designed to bring the two worlds of big data and data warehousing into a unified, enterprise-grade, powerful platform. In this blog post, we look at four real-world use cases where ... continue reading
:smile:

Managing Hybrid Runbook Worker At Scale

Hello readers , The Azure Automation question of today is: how can we manage (registration or de-registration) the Hybrid Runbook Workers (HRW) at scale? In this automated world, it is fool to think that we need to go each computer ... continue reading