Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Infographic showing Secure VPN connections to on-premises resources using Blue Cedar

Blue Cedar partners with Microsoft to combat BYOD issues

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.    Bring Your Own Device (BYOD) has been a divisive topic within corporations for years. Employees wanted the convenience of working on their own smart ... continue reading

The dynamic duo: How to build a red and blue team to strengthen your cybersecurity, Part 2

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the first post of our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks with Jake Williams, ... continue reading
TanTran_0-1611239541045.png

Microsoft Defender for Endpoint Adding Tags for Multiple Devices from CSV List

Bruno Gabrielli and Tan Tran Dear IT Pros, Related to Microsoft Defender for Endpoint, recently we got a request from a customer to create the Defender group of tool devices running Windows 10 Operating Systems. This device group later will ... continue reading

Azure Unblogged – Azure Resource Mover

Following on from the announcement in 2020 of Azure Resource Mover I'm pleased to release another episode of Azure Unblogged, where I am chatting to Kaza Sriram, Senior Program Manager on the Azure Resource Mover team. Kaza walked me through ... continue reading
EJansen_5-1611087576858.png

Secrets from the Deep – The DNS Analytical Log – Part 4

Hi Team, it's Eric Jansen again, here today to continue where we left off in Part 3 of the series. In the last episode, we discussed how to parse the DNS Analytical Log using a sample scenario where I've deployed ... continue reading
Timeline graph showing developments in the Solorigate attack

Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

More than a month into the discovery of Solorigate, investigations continue to unearth new details that prove it is one of the most sophisticated and protracted intrusion attacks of the decade. Our continued analysis of threat data shows that the ... continue reading
White text on black background: Data Exposed, Around the Clock with Azure SQL and Azure Data Factory.

Around the clock with Azure SQL and Azure Data Factory

On February 3-4, the Azure SQL and Azure Data Factory teams are partnering on a learning event for the community to come together to learn about Azure SQL and Azure Data Factory, meet the engineering teams behind these services, and ... continue reading
magdysalem_0-1611108265970.png

Secure DevOps Kit for Azure (AzSK)

In my previous blog I addressed the issue of managing credentials in the code and presented two different alternatives to secure it. In this post, I will focus on Azure subscription security health and its challenge. I could summarize the ... continue reading
Zero Trust Principles

Using Zero Trust principles to protect against sophisticated attacks like Solorigate

The Solorigate supply chain attack has captured the focus of the world over the last month. This attack was simultaneously sophisticated and ordinary. The actor demonstrated sophistication in the breadth of tactics used to penetrate, expand across, and persist in ... continue reading
A clickable link to the full PDF infographic to the Zero Trust whitepaper

How IT leaders are securing identities with Zero Trust

The past twelve months have been a remarkable time of digital transformation as organizations, and especially digital security teams, adapt to working remotely and shifting business operations. IT leaders everywhere turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work ... continue reading
Find the Hostname of a Hyper-V VM in Registry

Find the Hostname of a Hyper-V VM

If you are running a virtual machine (VM) on Hyper-V, sometimes you want to know on which Hyper-V host this VM is running. If you don't have access to the Hyper-V host, you need to find that information from within ... continue reading
Speakers_Blog_sarah_young_jeff_woosley_ned_pyle_matt_mcspirit.png

Periscope up – what's on the horizon for hybrid event

Now we let the cat out of the bag that we’re putting on an event on Feb 2nd, 2021 – it’s time to go a little deeper. How about some information about the AWESOME content we have lined up that ... continue reading
SmartScreen.gif

Windows Defender SmartScreen – File and Flash Player blockage problem.

SmartScreen has become a part of Windows 10 OS, it was named as Windows Defender SmartScreen. It is useful to protect not just Edge, Internet Explorer browsers but also other applications such as third-party browsers, Email Client and Apps from ... continue reading
Naveen_Kanneganti_0-1610737735456.png

Configuration Manager – Collect Client Logs

Hi Folks! I am Naveen kanneganti and welcome to my blog post. You can now send client notification action from the Configuration Manager to trigger a client device to upload its client logs to the site server. In order access ... continue reading
shows the Shared responsibility model

Simplify compliance and manage risk with Microsoft Compliance Manager

The cost of non-compliance is more than twice that of compliance costs. Non-compliance with the ever-increasing and changing regulatory requirements can have a significant impact on your organization’s brand, reputation, and revenue. According to a study by the Ponemon Institute and Globalscape, ... continue reading
Diagram of high-level Solorigate attack chain

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

­Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading
HITRUST is an organization governed by representatives from the healthcare industry and maintains the common security framework (CSF) to help healthcare organizations demonstrate their security and compliance.

Azure and HITRUST publish shared responsibility matrix

Healthcare solutions offered in the cloud are drawing unprecedented attention today with the ongoing global pandemic and the accompanying need for social distancing. Microsoft has been on the forefront of empowering health organizations to leverage the power of the cloud ... continue reading

Ten things you can implement to save costs in your Azure environment

Managing costs is a skillset that we need to learn when managing resources in the cloud, it is a change from running your resources on-premises. Managing costs can feel a bit overwhelming but it should be a team job, folks ... continue reading

Continuous Monitoring for Web Perf and Accessibility

Learn how the Azure Cloud Collaboration Center (CCC) visualization team continuously monitors a Web App for Performance and Accessibility using open-source tools Lighthouse API for perf and Axe-Core for accessibility and Azure DevOps pipelines to prevent perf regressions and common ... continue reading
front-line-2-1024x843.png

Empower your frontline workers with these Azure AD capabilities that just went GA

Howdy folks - (Cross-posting just to make sure you don't miss the big news.) Today we turned on the GA release of our new features for Frontline workers and Frontline managers. You can learn all about it over on the ... continue reading
Delegated user management in the My Staff portal

Azure Active Directory empowers frontline workers with simplified and secure access

Howdy folks, The past year has shown us all just how critical frontline workers are to our communities and our economy. They’re the people behind the counter, in the call centers, in hospital ICUs, on the supermarket floor—doing the critical ... continue reading
msresource.jpg

Orphaned Start Menu Apps Workaround

Hey community, this is Helmut Wagensonner, a Customer Engineer for Windows Client platform. Today I want to provide you a workaround for an issue I ran into a couple of times now at my customers. Please note that at the ... continue reading
ModInfra_Team_Binary.png

Let's try something different – ITOps Talks Hybrid Event

As a team who (used to) regularly speak at conferences or while creating engaging online technical content for various platforms – we thought we’d try something a little different. Talking with folks online to collect their feedback and taking stock ... continue reading

Project Bicep – Next generation ARM Templates

In this video, we'll go over the what, why, and how of Project Bicep and how it's going to make deploying infrastructure to Azure even easier. We'll go over the basics of what makes Bicep useful, as well as show ... continue reading
Azure Arc Hybrid Cloud Management Control Plane

How to manage your Hybrid Cloud environment with Azure Arc (Video)

In this Azure Arc video, I want to share the latest Azure Arc hybrid cloud management capabilities. Hybrid Cloud management becomes more and more important for many customers. We are seeing the customers taking advantage of cloud computing, but at ... continue reading

Azure SQL Database named among the top 3 databases of 2020

We are excited to share that Azure SQL Database is among the most popular databases of 2020 according to DB-Engines, who recently announced their DBMS of the Year award. DB-Engines collects information on database management systems and it provides a ... continue reading

Azure SQL Database named among the top 3 databases of 2020

We are excited to share that Azure SQL Database is among the most popular databases of 2020 according to DB-Engines, who recently announced their DBMS of the Year award. DB-Engines collects information on database management systems and it provides a ... continue reading

New Surface PCs enable virtualization-based security (VBS) by default to empower customers to do more, securely

VBS and HVCI-enabled devices help protect from advanced attacks Escalation of privilege attacks are a malicious actor’s best friend, and they often target sensitive information stored in memory. These kinds of attacks can turn a minor user mode compromise into ... continue reading
Pic1

App Registration Expiration Monitoring and Notifications

Problem Statement Azure services do not have a native feature to report on expiring App registrations. Without a solution in place to monitor and notify on expiration of these SPN’s solutions ranging from Custom Apps, and DevOps CICD Pipelines too ... continue reading
Azure Virtual Networks add dialog

Configuring Azure virtual network subnets with CIDR notation

For people new to networking, creating Azure Virtual Network subnets can be tricky. Learn how CIDR notation works to segment ranges of IP addresses. When you create an Azure virtual network, you'll get default IP addresses that look something like ... continue reading