Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

A diagram showing the Microsoft Cloud App Security and its integration with CSAB solutions

A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security

Today’s business uses an average of 1,180 cloud apps¹, with many of those organizations securing their apps through cloud access security brokers (CASB). The organizational need for a CASB has grown alongside the use of cloud apps to enable remote ... continue reading
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
Techielass_0-1614166562220.png

Windows Admin Center Capabilities

Windows Admin Center is a tool I wish I had had when I was managing servers. When the tool was first announced in 2017 under the name Project “Honolulu”, I was intrigued. I was working for a managed service provider ... continue reading
Screenshot of Microsoft Excel file with malicious XLM macros

XLM + AMSI: New runtime defense against Excel 4.0 macro malware

We have recently expanded the integration of Antimalware Scan Interface (AMSI) with Office 365 to include the runtime scanning of Excel 4.0 (XLM) macros, to help antivirus solutions tackle the increase in attacks that use malicious XLM macros. This integration, ... continue reading

10 Reasons to Love Passwordless #9: Onboard without a password

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Alex Weinert continues the series with this post in which he describes how much customers are going to benefit from Temporary ... continue reading
Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell

Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell

AksHci PowerShell February Release If you were one of many people who gave us feedback on our December release, we have exciting news for you! In our February release, we’ve delivered one of the most requested features, additional networking options! ... continue reading

Compliance joins Microsoft Intelligent Security Association (MISA)

Like many of you, I’m thrilled to have my 2020 calendar safely in the recycling pile. During that time though, you too might have noticed how, perhaps unknowingly, you were able to turn some of last year’s lemons into lemonade ... continue reading
Bhavna_Appayya_0-1614748281431.png

Secure your Infrastructure Monitoring with SCOM

Recent high profile cyberattacks have highlighted the importance of having strong standards and features built into infrastructure monitoring and management tools. Microsoft System Center Operations Manager (SCOM) offers world class monitoring capabilities and includes powerful built-in security features. Our increased ... continue reading
Azure Unblogged - Azure Arc Jumpstart Project

Azure Unblogged – Azure Arc Jumpstart Project

In this episode of Azure Unblogged, @thomasmaurer speaks with @liorkamrat about the Azure Arc Jumpstart project. The Azure Arc Jumpstart project is designed to provide a "zero to hero" experience so you can start working with Azure Arc right away!With ... continue reading
M365 Defender Incident Page

Microsoft 365 Defender Incident Overview

Introduction  This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will go over the Microsoft 365 Defender Security Portal and go into detail of the incident ... continue reading
HAFNIUM targeting Exchange Servers with 0-day exploits

HAFNIUM targeting Exchange Servers with 0-day exploits

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to ... continue reading
7.png

10 Reasons to Love Passwordless #7: Authenticator app for easy phone sign-in

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Alex Weinert continues this series. In previous blogs in this series, we shared how passwords lead to breaches, lost productivity ... continue reading

PowerShell Team 2021 Investments

The PowerShell Team plans engineering work per semester (6 months at a time). However, PowerShell itself follows the .NET schedule of release every year. In this blog post, we’ll cover the year long plan for PowerShell 7.2 as well as ... continue reading
blueprint.png

Azure Blueprints vs Azure Resource Manager template specs

Hello folks, I’ve had a few conversations lately with IT pros and operations folks that made me think that there may be a disconnect or some confusion about the role of Azure blueprints and ARM templates specs. There were comments ... continue reading
Azure AD Temporary Access Pass

Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work

We’re now a year into our new reality, and two trends stand out. First, people need even more flexibility as we work, learn, and collaborate in a world without perimeters. And second, bad actors are getting even more sophisticated. They’re ... continue reading
The Windows Admin Center will allow easy management of Secured-core functionality from any browser

Microsoft brings advanced hardware security to Server and Edge with Secured-core

A cursory look at recent headlines reveals two clear trends. First, organizations around the world are embracing digital transformation using technologies across cloud and edge computing to better serve their customers and thrive in fast-paced environments. Second, attackers are constantly ... continue reading

4 ways Microsoft is delivering security for all in a Zero Trust world

If there’s one thing the dawning of 2021 has shown, it’s that security isn’t getting any easier. Recent high-profile breach activity has underscored the growing sophistication of today’s threat actors and the complexity of managing business risk in an increasingly ... continue reading
New automation rules in Azure Sentinel

Microsoft unifies SIEM and XDR to help stop advanced attacks

For all of us in security, the last twelve months have been an incredible series of challenges—from balancing remote work with family priorities, to helping build resilient businesses, and protecting against the latest attacks. 2020 showed us that while we ... continue reading

Securing and governing data in a new hybrid work reality

The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading

Moving work items around using the Azure DevOps Migration Tools

In this episode, Abel and Martin will talk about moving Work Item data between Collections, Organizations, and Projects in Azure DevOps and TFS using the Migration Tools. Jump to:[04:44] Where to find the Migration Tools[06:33] Configuring the Migration Tools[11:25] Running ... continue reading
Picture1-eventcoms.jpg

Top 5 things to get the most out of Microsoft Ignite

We’re one day away from the kick off of Microsoft Ignite digital experience taking place March 2nd-4th starting at 8am PST. I thought it would be a good idea to share some special insights on how to get the most ... continue reading

10 Reasons to Love Passwordless #8: You won’t get phished!

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Maria Puertas Calvo, data scientist for Microsoft Identity, continues the series. Hi! I am honored to be among such a ... continue reading

Troubleshoot AKS cluster issues with AKS Diagnostics and AKS Periscope

Yun Jung Choi shows Scott Hanselman how to use AKS Diagnostics and AKS Periscope to troubleshoot issues on your AKS cluster. Use AKS Diagnostics to identify problems and get actionable recommendations on how to resolve AKS cluster issues. Run AKS ... continue reading

Autoscale applications on Kubernetes with Kubernetes Event-Driven Autoscaling (KEDA)

Do you want to scale your workloads on Kubernetes without having to worry about the details? Do you want to run Azure Functions anywhere and easily scale it yourself? Tom Kerkhove shows Scott Hanselman how Kubernetes Event-Driven Autoscaling (KEDA) makes ... continue reading
Bild1.png

Enable Application Setups to Change File Type Associations

Tested with Windows 10 1609 up to 20H2 Hey community, this is Helmut Wagensonner, a Customer Engineer for Windows Client platform. Today I show you a way to make file type associations more enterprise ready. I heard many of my ... continue reading
Task Sequence Bootstrapping - OSD Video Tutorial: Part 26

Task Sequence Bootstrapping – OSD Video Tutorial: Part 26

Hi everyone, we have added a new video tutorial to the Advanced OSD series. This tutorial highlights the ability to bootstrap a task sequence during client installation. This was introduced in ConfigMgr current branch 2002 and refined in ConfigMgr current ... continue reading
6-1.png

10 Reasons to Love Passwordless #6: The Passwordless Funnel

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Tarek Dawoud, principal program manager, continues this series. Since we announced our Public Preview of passwordless credential management, we have ... continue reading

PowerShell for Visual Studio Code Updates – February 2021

We are excited to announce that updates to our PowerShell extension and PowerShell Preview extension are now available on the Visual Studio Code marketplace. This blog will explain what is new in these releases as well as what you can expect from the extension in ... continue reading
1.PNG

Wipro streamlines guest-user access with Azure AD External Identities – Microsoft

Hello! In today’s “Voice of the Partner” blog, Prakash Narayanamoorthy, Principal Microsoft Security Architect for Wipro, explains how his company transformed their identity and access management (IAM) offer while delivering an elevated level of governance and secure access across external ... continue reading
Microsoft open sources CodeQL queries used to hunt for Solorigate activity

Microsoft open sources CodeQL queries used to hunt for Solorigate activity

A key aspect of the Solorigate attack is the supply chain compromise that allowed the attacker to modify binaries in SolarWinds’ Orion product. These modified binaries were distributed via previously legitimate update channels and allowed the attacker to remotely perform ... continue reading