Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Graphic depicting how new passwords that are secure enough are hard to remember.

The passwordless future is here for your Microsoft account

Nobody likes passwords. They’re inconvenient. They’re a prime target for attacks. Yet for years they’ve been the most important layer of security for everything in our digital lives—from email to bank accounts, shopping carts to video games. We are expected ... continue reading
Azure Arc - enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

Azure Arc – enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

In this video, I had the chance to speak with Dhananjay Mahajan @dhanMMS (Principal Program Manager at Microsoft) about how you can run Azure Arc enabled data services on Azure Stack HCI with Azure Kubernetes Service (AKS). This provides you ... continue reading

Windows 11 Insider 22449 update for SMB compression

Heya folks, Ned here again. We released a change to SMB compression for Windows 11 Insider Preview build 22449 & later. We stopped being so algorithmically cute: when you request compression, we now just try to do it because you ... continue reading

Azure File Sync survey

Heya folks, Ned here again. Are you a current or past user of Azure File Sync? Are you considering using Azure File Sync? The Azure Files team is updating their roadmap and need your feedback! Please take a few minutes ... continue reading
Azure Monitor Diagram

Alert Based on Log to Metrics Feature on Azure Monitor

Hi all, I’m Edoardo, and I work in Microsoft as a Customer Engineer, where I’m focused on Azure Monitor and Azure Infrastructure. The idea of this article was born during a delivery, when a customer asked me if it was ... continue reading

DevOps Lab | Level up your Bicep skills on Microsoft Learn

On today's episode of The DevOps Lab, April Edwards welcomes John Downs to demonstrate Bicep's many capabilities for complex Azure deployments. We'll provide learning material and guidance to support you as you upskill on Bicep. Jump to:[01:09] What is Bicep?[03:37] ... continue reading
Top 6 tips for configuring a new Microsoft Azure environment

Top 6 tips for configuring a new Microsoft Azure environment

A sparkling new Microsoft Azure environment is a beautiful thing, but before you start creating resources, what should you configure first? The Microsoft Cloud Adoption Framework has detailed guidance on defining your strategy, planning for the cloud, getting ready with ... continue reading

Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors

Information has long been wielded as an instrument of national power and influence. In today’s digital world, misinformation can also be just as powerful. On a special episode of Afternoon Cyber Tea with Ann Johnson, Sandra Joyce, Executive Vice President ... continue reading

Get a secure baseline architecture for Azure Kubernetes Service (AKS)

Derek Martin joins Scott Hanselman to discuss the Azure Kubernetes Service (AKS) Secure Baseline reference implementation from the Azure Architecture Center. Learn what it is, how it works, and how you can use it to start your production deployment in ... continue reading

Combat attacks with security solutions from Trustwave and Microsoft

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In 2021, cyberattacks and instances of ransomware demands against companies, agencies, and institutions have dominated the headlines. These kinds of attacks are on the rise ... continue reading

Why diversity is important for a strong cybersecurity team

Medicine. Aeronautics. Academia. When you’re a cybersecurity professional, the colleague next to you could have started in one of these industries—or just about any other you can imagine. The backgrounds of cybersecurity professionals are more diverse than those of professionals ... continue reading
PowerShell Basics: Query Azure Role Based Access Control Assignments

PowerShell Basics: Query Azure Role Based Access Control Assignments

A great way to learn PowerShell is to set up a scenario in the Azure portal, then try different PowerShell commands to see if you can get the same results. In this article, we'll use Azure Role Based Access control, ... continue reading
An image of Azure Firewall Premium SKU with a drop down menu for the new auto-generated certification mechanism.

Boost your network security with new updates to Azure Firewall

This post was co-authored by Eliran Azulai, Principal Program Manager, Azure Networking. Today, we are announcing new Azure Firewall capabilities as well as updates for August 2021. Azure Firewall supports US West 3, Jio India West, and Brazil Southeast. Auto-generated ... continue reading
Multi-zone Windows Server Failover Cluster with shared ZRS disk

Improve availability with zone-redundant storage for Azure Disk Storage

As organizations continue to accelerate their cloud adoption, the need for reliable infrastructure is critical to ensure business continuity and avoid costly disruptions. Azure Disk Storage provides maximum resiliency for all workloads with an industry-leading zero percent annual failure rate ... continue reading

Open sourcing the .NET 5 C# Language Extension for SQL Server

For over two decades, the C# programming language has allowed developers to build secure and robust applications within the .NET ecosystem.SQL Server 2019 supports the R, Python, and Java Language Extensions. These language extensions provide many benefits to developers. They ... continue reading
Azure Unblogged - Azure Confidential Computing

Azure Unblogged – Azure Confidential Computing

In this episode of Azure Unblogged, Thomas Maurer speaks with Stefano Tempesta about Azure Confidential computing. Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment (TEE). While cloud-native workloads data is ... continue reading
Microsoft's recommended mitigation prioritizations: prepare, limit, and prevent.

3 steps to prevent and recover from ransomware

On July 14, 2021, the National Cybersecurity Center of Excellence1 (NCCoE) at the National Institute of Standards and Technology2 (NIST) hosted a virtual workshop3 to seek feedback from government and industry experts on practical approaches to preventing and recovering from ... continue reading

DevOps Lab | Infra as Code in Action: Secrets management | Ep 2 of 4-episode series

April Edwards and Christopher Maneu are back for part two of this four-part series, Infra as Code in Action! Today, they'll be talking about secrets management! Is it really important to keep secrets? Yes! And there's more to it than ... continue reading
An image in white text that reads deploy more intelligent solutions with AI and advanced technologies download the white paper

4 ways AI, computer vision, and related technologies expand IoT solutions

Inspecting five million vehicle welds every day requires the ability to check a weld’s quality every 17 milliseconds—an impossible challenge for a human. This type of quality control task is just one of many where the combined technologies of computer ... continue reading
Create MECM Windows Server 2022 Device Collection

Create MECM Windows Server 2022 Device Collection

With the release of Windows Server 2022 I was deploying a new server into a Microsoft Endpoint Configuration Manager lab that I have for certain scenarios and one of the tasks I wanted to do was create a Device Collection ... continue reading

Azure & Desired State Configuration Part 4/4

Part 1 : Focus on Desired State Configuration in PowerShell Part 2 : Focus on Deploying with DevOps Pipeline Part 3 : Focus on Azure Automation Account Part 4 : Focus on DSC in Automation Account What will I need? ... continue reading
Onboard partners more easily with new Azure AD entitlement management features

Onboard partners more easily with new Azure AD entitlement management features

Onboarding partners cleanly and efficiently is now easier because of two recently introduced entitlement management features in Azure Active Directory – custom questions and attribute collection. Today, we’re highlighting how these features work and sharing how they help with processes ... continue reading

Storage Innovations in Windows Server 2022

We are excited to release new features in Storage for Windows Server 2022. Our focus is to provide customers with greater resiliency, performance, and flexibility. While some of these topics have been covered elsewhere, we wanted to provide a single ... continue reading

Eliminate data silos with NFS 3.0 support for Azure Blob Storage

Yuan Zheng joins Scott Hanselman to discuss and demonstrate Blob storage support for the NFS 3.0 protocol, which enables you to run your applications on a single storage platform. With no application rewrites necessary you will also help eliminate data ... continue reading
Screenshot of code showing instance of SSH

A deep-dive into the SolarWinds Serv-U SSH vulnerability

Several weeks ago, Microsoft detected a 0-day remote code execution exploit being used to attack the SolarWinds Serv-U FTP software in limited and targeted attacks. The Microsoft Threat Intelligence Center (MSTIC) attributed the attack with high confidence to DEV-0322, a ... continue reading

New features of Windows Server 2022 Failover Clustering

Greetings again Windows Server and Failover Cluster fans!! John Marlin here and I own the Failover Clustering feature within the Microsoft product team. In this blog, I will be giving an overview of the new features in Windows Server 2022 ... continue reading
Secure access to Amazon Managed Grafana with Azure AD

Secure access to Amazon Managed Grafana with Azure AD

Our customers tell us that the applications and services they use to succeed extend across clouds and platforms. It’s why we are committed that our identity solutions work seamlessly and securely across platforms and extend to all clouds and apps ... continue reading

Windows Server 2022 is full of new file services!

Heya folks, Ned here again. As you’ve heard by now, Windows Server 2022 is available and supported for production deployments. This new OS brings many new features around security, storage, networking, web, containers, applications, virtualization, edge, and Azure hybrid. Today ... continue reading
Image demonstrating process to start utilizing Valimail Authenticate.

Get free DMARC visibility with Valimail Authenticate and Microsoft Office 365

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Phishing and email spoofing not only erode brand trust but also leave recipients vulnerable to financial loss and serious invasions of privacy. These tactics have ... continue reading
HashiCorp’s Azure AD Provider Migrates to Microsoft Graph, Improving Performance and User Experience

HashiCorp’s Azure AD Provider Migrates to Microsoft Graph, Improving Performance and User Experience

Hello! I’m Sue Bohn, Partner Director of Program Management for Identity and Access Management. In this Voice of the ISV blog post, we’ve invited Tom Bamford, Senior Engineer at HashiCorp, to discuss the migration of their Terraform Azure AD provider ... continue reading