Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles on just that Topic. Select All to view the entire library.

Using PowerShell and Twilio API for Efficient Communication in Contact Tracing

Using PowerShell and Twilio API for Efficient Communication in Contact Tracing

|
Piyush Tripathi The COVID-19 pandemic has underscored the importance of rapid and reliable communication technology. One vital application is in contact tracing efforts, where prompt notifications can make a significant difference. This guide focuses on utilizing PowerShell in conjunction with … Continue Reading
MichaelHildebrand_0-1701033071685.png

The Twelve Days of Blog-mas: No.2 – Windows Web Sign in and Passwordless

|
Hi folks – welcome to the second post in the holiday ’23 series. Today’s post is about a capability that came to preview long ago but recently surprised much of the world and moved to General Availability (GA). This allows you … Continue Reading
talberdah_4-1701236576135.png

Defender for cloud’s Agentless secret scanning for virtual machines is now generally available!

|
Cloud cybersecurity is of paramount importance in today’s digital landscape, as organizations increasingly rely on cloud services to store and manage sensitive data, applications, and infrastructure. Attacks on cloud infrastructure pose severe risks to organizations such as data theft, ransomware … Continue Reading
Preston_Romney_2-1701204216231.png

Connecting to Azure Services on the Microsoft Global Network

|
In this article Microsoft Global Network  Default Public Access Service Endpoints Private Link Internet Routing Preference Azure Services and the solutions you deploy into Azure are connected to the Microsoft global wide-area network also known as the Microsoft Global Network … Continue Reading
image

Windows Server vNext at Microsoft Ignite, and What’s New in Active Directory Technical Takeoff

|
Hey everybody, Ryan Ries here with a quick heads-up that there is some hot-off-the-presses content you need to check out if you’re interested in Windows Server and Active Directory. And if you’re reading this, I know you are. First, we … Continue Reading
Jeff Woolsey & Elden Christensen on stage

What’s new in Windows Server vNext Ignite Session Now Available

|
Heya folks, Ned here again. The Microsoft Ignite 2023 session “What’s new in Windows Server vNext” is now up if you weren’t able to attend in person. It covers many of the new features coming to Windows Server including Active Directory, File … Continue Reading
MichaelHildebrand_1-1701030605526.png

The Twelve Days of Blog-mas: No.1 – A Creative Use for Intune Remediations

|
Happy Holidays folks!  I had a wild-hair idea to write one short blog post, per day, for 12 days along the theme of the “Twelve Days of Christmas” song.  I made the mistake of mentioning the idea to one Arnab … Continue Reading
Asaf_Nakash_0-1699347102377.png

Simplifying Onboarding to Microsoft Defender for Cloud with Terraform

|
If you are looking for a way to onboard Microsoft Defender for Cloud (MDC) with Terraform, you are in luck! In this blog post, we will introduce you to a new Terraform module that simplifies and enhances the onboarding experience … Continue Reading
fig1.png

Effective novelty detection in cloud security domain

|
In cloud security domain, we often need to monitor entities – such as users, IP addresses, applications, or access tokens – and their patterns of behavior. We might want to detect ‘novelties’ – unexpected and previously unseen values of these … Continue Reading
ap1.png

Step-by-Step : Assign access packages automatically based on user properties in Microsoft Entra ID

|
Microsoft Entra ID Governance offers the capability to manage the access lifecycle of resources through access packages, which are organized into catalogs and define the resources available within them. Each access package includes at least one policy that outlines who … Continue Reading
screenshot of malware code for checking date and time of the host

Diamond Sleet supply chain compromise distributes a modified CyberLink installer

Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea-based threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink Corp., a software company that develops multimedia software products. This malicious file … Continue Reading
image

Defender for Cloud unified Vulnerability Assessment powered by Defender Vulnerability Management

|
Microsoft Defender for Cloud is a multicloud application protection platform (CNAPP) designed to protect your cloud-based applications from code-to-cloud. A key component of cloud security is continuously monitoring and managing new vulnerabilities across your cloud workloads. Vulnerability management helps organizations … Continue Reading
charlesoxyer_0-1700590496301.png

Securing your GitLab Environment with Microsoft Defender for Cloud

|
Introduction In the dynamic landscape of software development, developers across diverse organizations are embracing a wide variety of Source Code Management (SCM) and CI/CD pipeline systems to optimize their workloads. While this trend presents flexibility, collaboration, and speed to software … Continue Reading
ShaharAviv_0-1700163078351.png

Elevating Cybersecurity Intelligence with Microsoft Sentinel’s Enrichment Widgets

|
At Microsoft, we are continually advancing our tools to empower users in making data-driven and informed decisions. Our latest advancement in Microsoft Sentinel is the introduction of Enrichment Widgets. Widgets provide critical enrichment data, delivering key insights often encapsulated in … Continue Reading
Screenshot of a fake WhatsApp phishing message asking users to update KYC using a APK file.

Social engineering attacks lure Indian users to install Android banking trojans

Microsoft has observed ongoing activity from mobile banking trojan campaigns targeting users in India with social media messages designed to steal users’ information for financial fraud. Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to … Continue Reading

Automate Text Summarization with OpenAI and PowerShell

|
Automating tasks is the core of PowerShell scripting. Adding artificial intelligence into the mix takes automation to a whole new level. Today, we’ll simplify the process of connecting to OpenAI’s powerful text summarization API from PowerShell. Let’s turn complex AI … Continue Reading
JerryDevore_4-1700510212575.png

Active Directory Hardening Series – Part 2 – Removing SMBv1

|
Hi All!  Jerry Devore back again with another hardening Active Directory topic.  Before we jump into the technical stuff, I would like to briefly share some tips for structuring a protocol hardening project.  I picked up these suggestions from working … Continue Reading
image

Introducing a Unified Security Operations Platform with Microsoft Sentinel and Defender XDR

|
Introducing a Unified Security Operations Platform with Microsoft Sentinel and Defender XDRSecurity teams are tasked with more responsibilities than ever before, and the complexity of today’s security tooling landscape doesn’t make their job any easier. They need to sift through … Continue Reading
image

Unified MDTI APIs in Microsoft Graph Now GA

|
We’re thrilled to share that the unified APIs that are part of the Microsoft Graph are now generally available! These APIs come with a single endpoint, permissions, auth model, and access token. The Microsoft Defender Threat Intelligence (Defender TI) APIContinue Reading
Liveness UX flow.png

Are You Alive: Enhancing Azure AI Vision Face API with Liveness Detection

|
We are excited to announce the public preview of Liveness Detection, an addition to the existing Azure AI Face API service. Facial recognition technology has been a longstanding method for verifying a user’s identity in device and online account login … Continue Reading
image

How to train and publish direct custom model using Azure AI Translator | Custom Translator

|
Custom Translator has been a key translation enabler capability in Azure AI Translator for almost a decade, with customers across industries such as transportation, healthcare and financial services using it to develop custom translator models. Custom Translator launched the Neural … Continue Reading
YanlingX_0-1700504388219.png

Introducing new task-optimized summarization capabilities powered by fine-tuned large-language model

|
For years, developers around the world have relied on pre-built AI capabilities offered through Azure AI Language, ranging from analyzing sentiment, extracting information, mining opinions and much more. Such pre-built capabilities have accelerated AI building efforts for enterprises looking to … Continue Reading
image

What’s new in Azure AI Speech

|
Today at Microsoft Ignite, we are super excited to announce a number of new capabilities for Azure AI Speech! This article provides a summary of all the new and recent releases.We also recently released improved pricing for some of our … Continue Reading
leveraging securoty copilot.png

How MDTI Helps Power Security Copilot

|
Today’s cybersecurity challenges mandate that security teams invest more in high-quality threat intelligence to understand the mechanics of sophisticated attacks led by cybercriminals, nation-state actors, and others. With the introduction of Microsoft Security Copilot, security professionals can use Generative AI … Continue Reading
The MDTI free version is available to all Defender tenants on the “Intel profiles”, “Intel explorer”, and “Intel projects” tabs in the “Threat intelligence” blade.

Introducing MDTI Free Experience for Microsoft Defender XDR

|
Today, we are thrilled to announce that we are unleashing the power of threat intelligence to all Microsoft Defender XDR tenants. Starting at Microsoft Ignite, all Defender XDR users will see Microsoft Defender Threat Intelligence (MDTI) in the threat intelligence … Continue Reading
tal_rosler_1-1699983193533.png

Enhancing Defender CSPM across the application lifecycle

|
Organizations are challenged with managing multicloud security due to the complexity of coordinating security measures across diverse cloud environments, each with its unique configurations and vulnerabilities. Visibility across cloud environments can be limited, making it challenging to effectively triage issues … Continue Reading
jfilcik_0-1700007382063.png

Video Retrieval: GPT-4 Turbo with Vision Integrates with Azure to Redefine Video Understanding

|
Microsoft is thrilled to unveil the Azure AI Vision Video Retrieval preview. This innovative feature revolutionizes video search, enabling the exploration of thousands of hours of video content through advanced multi-modal vector indexing of vision and speech. Further enhancing the … Continue Reading
image

Unveiling Bilingual Speech Modeling for Seamless Multilingual Conversations

|
By Jacky Kang, Eric Sun, Jing Pan, Yuhui Wang, Mark Hillebrand, Padma Varadharajan, Fei ZuoWe’re thrilled to announce a groundbreaking feature in our real-time speech modeling—Bilingual Speech Modeling. This innovation is a game-changer, as our speech model now seamlessly supports bilingual language … Continue Reading
vijetaj_0-1699998650789.png

Model training and Fine Tuning with serverless compute

|
We are happy to announce the General Availability of Model Training with Serverless Compute. Serverless compute is a fully-managed, on-demand compute target for a simplified way of running training jobs in Azure Machine Learning. Through serverless compute, machine learning (ML) professionals … Continue Reading
List view of the Model benchmarks experience

Model Benchmarks in Azure AI Studio

|
OverviewAzure AI Studio is a versatile and user-friendly platform designed to cater to the diverse needs of developers, data scientists, and machine learning experts. It offers a comprehensive suite of tools and services, making the journey from concept to evaluation … Continue Reading