Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Govern your data wherever it resides with Azure Purview

Last December, Gaurav was on Azure Friday with Scott Hanselman to introduce a new Azure service: Azure Purview. He showed how Azure Purview scans and map all your data—no matter where it is. Azure Purview is now generally available, and ... continue reading
Group of young adults wearing backpacks sit on bleachers surrounding laptop.

Defenders wanted—building the new cybersecurity professionals

As part of Cybersecurity Awareness Month, we published a special blog post earlier this week featuring real-world experiences shared by cybersecurity professionals: people with diverse backgrounds in law, academia, software development, and other seemingly unrelated fields. This topic is near ... continue reading
Screenshot of HTML code showing zero-point font technique

Franken-phish: TodayZoo built from other phishing kits

A phishing kit built using pieces of code copied from other kits, some available for sale through publicly accessible scam sellers or are reused and repackaged by other kit resellers, provides rich insight into the state of the economy that ... continue reading
AZ-801 Study Guide: Configuring Windows Server Hybrid Advanced Services

AZ-801 Study Guide: Configuring Windows Server Hybrid Advanced Services

In this exam guide you’ll see which MS Learn modules map against exam functional groups and which docs.microsoft.com articles map against specific exam objective items for the AZ-801 Configuring Windows Server Hybrid Advanced Services exam. This exam is required for ... continue reading
Microsoft Sysinternals report in VirusTotal.

New Microsoft Sysmon report in VirusTotal improves security

Today, following the 25th year anniversary of Microsoft Sysinternals, we are announcing the general availability of a new Microsoft Sysmon report in VirusTotal. Whether you’re an IT professional or a developer, you’re probably already using Microsoft Sysinternals utilities to help you ... continue reading
Use Microsoft Azure monitoring, security, and update services anywhere

Use Microsoft Azure monitoring, security, and update services anywhere

I had the chance to talk with Ryan Willis (Senior Program Manager at Microsoft) on how onboarding resources through Azure Arc makes them immediately eligible to enroll in additional Azure management services. Learn how to implement Azure monitoring, security, and ... continue reading
The privacy management dashboard shows an overview of privacy alerts, such as items containing personal data, subject rights requests, and more.

Simplifying the complex: Introducing Privacy Management for Microsoft 365

The data privacy regulation landscape is more complex than ever. With new laws emerging in countries like China and India, shifts in Europe and the United Kingdom, and currently 26 different laws across the United States, staying ahead of regulations ... continue reading
Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

In a business, when setting up new servers or computers, most of the time administrators are using one common password for the local administrator account. This account is usually used as a backdoor by administrators for software installation/uninstallation, to log ... continue reading
Enclave Device Blueprint Architecture

The Enclave Device Blueprint for confidential computing at the edge

A major milestone towards making confidential computing in IoT mainstream for privacy and safety. In collaboration with Arm® Technologies and Scalys BV, we are announcing the immediate availability of the Enclave Device Blueprint to help towards making confidential computing a ... continue reading

Increase ROI and business impact with Azure Machine Learning

A growing number of organizations are taking advantage of machine learning to increase efficiency, enhance customer experiences and drive innovation. With increasing use of machine learning, customers might wish to consider a cost-benefit and value analysis across infrastructure, operations, and ... continue reading

Get career advice from 7 inspiring leaders in cybersecurity

Are you currently studying information security? Or are you considering transitioning to a career in cybersecurity? According to the US Bureau of Labor Statistics, cybersecurity jobs will grow 31 percent from 2019 to 2029—more than six times the national average ... continue reading

Empower an adaptive IT environment with Inside Azure for IT

In July, we announced Inside Azure for IT, an online technical skilling resource designed for cloud professionals to transform their IT operations with Azure best practices and insights. The team here has been so inspired by how many of you ... continue reading
MichaelKullish_0-1632940746924.png

Microsoft 365 Password Expiration Notification Email Solution for On-Premises AD Accounts

"Hello Again World!" Hi there! Mike Kullish, here. I'm a Microsoft Customer Engineer (CE) based just off the Gulf Coast of Florida with a focus on AD, Hyper-V and DFS, but I try to help customers with anything on the ... continue reading

Automate threat response with Azure Sentinel

Sarah Young joins Scott Hanselman to discuss updates to Azure Sentinel automation and how you can use it to accelerate and streamline threat response for your security operations.[0:00:00]– Introduction[0:02:41]– Azure Sentinel automation rules[0:06:15]– Automating responses with playbooks [0:09:30]– Playbook templates ... continue reading

A closer look at the Crescendo configuration

In my previous post, I looked at the details of a Crescendo output handler from my VssAdmin module. In this post, I explain the details of a cmdlet definition in the Crescendo JSON configuration file. The structure for the interface ... continue reading
Image demonstrating the integration with NC Protect and Microsoft Information Protection.

archTIS and Microsoft: Zero Trust information security for Microsoft Teams

Microsoft Teams has seen a surge in growth during the pandemic with over 115 million daily active users and growing.1 With it, customer imperative for enabling safe and trustworthy online collaboration has also increased significantly. The speed and simplicity of Teams ... continue reading

Humana leverages Microsoft Cloud for Healthcare to develop advanced predictive models

​​This blog post has been co-authored by Slawek Kierner, SVP of Enterprise Data & Analytics, Humana and Tie-Yan Liu, Assistant Managing Director, Microsoft Research China. Trips to the hospital happen. And while everyone in the industry strives to deliver world-class ... continue reading
AzureFunBytes Short - Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes Short – Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make up Azure. It's a chance for me to understand more about what people across the Azure organization do and how they do it. Every week ... continue reading
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
Deploying HTTP/3 on Windows Server at Scale

Deploying HTTP/3 on Windows Server at Scale

Windows Server 2022 was released for general availability last month. Since then, in cooperation with the Microsoft 365 team, we have started deploying the latest Windows Server on Exchange Online service front door servers globally, with a primary goal of ... continue reading

DevOps Lab | Hashicorp Series | Episode 2 | How to terraform everything

Welcome to the second episode in our HashiCorp series, Kyle Ruddy is back to show us how we can use terraform to manage both Azure and Github with code. While many people only use it to provision infrastructure, it actually ... continue reading
™

Azure network security helps reduce cost and risk according to Forrester TEI study

As organizations move their computing from on-premises to the cloud, they realize that leveraging cloud-native security tools can provide additional cost savings and business benefits to their security infrastructure. Microsoft Azure network security offers a suite of cloud-native security tools ... continue reading
ParseShadowStorage function

A closer look at the parsing code of a Crescendo output handler

In my previous post, I showed you how to parse the output from the netstat command. The output of netstat is not very complex. The goal of the post was to introduce some parsing strategies that you can use to ... continue reading
Pie graph showing DART engagement metrics by industry spanning from July 2020-June 2021. According to the graph, Consumer/Retail industry holds the highest engagement rate with 13 percent and Energy industry ranks the lowest at just 4 percent.

How cyberattacks are changing according to new Microsoft Digital Defense Report

In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading

Iran-linked DEV-0343 targeting defense, GIS, and maritime sectors

DEV-0343 is a new activity cluster that the Microsoft Threat Intelligence Center (MSTIC) first observed and began tracking in late July 2021. MSTIC has observed DEV-0343 conducting extensive password spraying against more than 250 Office 365 tenants, with a focus ... continue reading
Figure 1—maximum attack bandwidth (terabytes per second) in 2020 vs. August 2021 attack.

Business as usual for Azure customers despite 2.4 Tbps DDoS attack

This blog post was co-authored by Alethea Toh, Program Manager and Syed Pasha, Principal Network Engineer, Azure Networking. In early August, we shared Azure’s Distributed Denial-of-Service (DDoS) attack trends for the first half of 2021. We reported a 25 percent ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading

Add communications user experiences with Azure Communication Services

David de Matheu joins Scott Hanselman to show how the Azure Communication Services UI Library enables you to add communications capabilities to your applications with only a couple lines of code plus composable components and turn-key composites. [0:00:00]– Overview[0:00:49]– General ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
The five guiding principles of Decentralized Identities are: 1. Secure, reliable, and trustworthy; 2. Privacy protecting and in my control: 3. Inclusive, fair, and easy to use; 4. Supervisable; 5. Environmentally Responsible.

Microsoft’s 5 guiding principles for decentralized identities

Three years ago, as part of Microsoft’s mission to empower people and organizations to achieve more, we announced that we were incubating a new set of decentralized identity technologies based on a simple vision: Each of us needs a digital ... continue reading