Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

The privacy management dashboard shows an overview of privacy alerts, such as items containing personal data, subject rights requests, and more.

Simplifying the complex: Introducing Privacy Management for Microsoft 365

The data privacy regulation landscape is more complex than ever. With new laws emerging in countries like China and India, shifts in Europe and the United Kingdom, and currently 26 different laws across the United States, staying ahead of regulations ... continue reading
Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

In a business, when setting up new servers or computers, most of the time administrators are using one common password for the local administrator account. This account is usually used as a backdoor by administrators for software installation/uninstallation, to log ... continue reading
Enclave Device Blueprint Architecture

The Enclave Device Blueprint for confidential computing at the edge

A major milestone towards making confidential computing in IoT mainstream for privacy and safety. In collaboration with Arm® Technologies and Scalys BV, we are announcing the immediate availability of the Enclave Device Blueprint to help towards making confidential computing a ... continue reading

Join us at NAFEMS World Congress to learn more about Azure HPC and AI Supercomputing

Design and deployment of high-performance computing (HPC) infrastructure is often constrained by physical resources, internal know-how, and policies. That can be a challenge in the current era of new hardware architectures, programming paradigms, and constantly changing simulation software. The cloud ... continue reading

Increase ROI and business impact with Azure Machine Learning

A growing number of organizations are taking advantage of machine learning to increase efficiency, enhance customer experiences and drive innovation. With increasing use of machine learning, customers might wish to consider a cost-benefit and value analysis across infrastructure, operations, and ... continue reading
™

Microsoft achieves a Leader placement in Forrester Wave for XDR

We are excited to share that Microsoft has been named a Leader in The Forrester New Wave: Extended Detection and Response (XDR), Q4, 2021,1 receiving one of the highest scores in the strategy category. Microsoft 365 Defender was rated as “differentiated” ... continue reading

Get career advice from 7 inspiring leaders in cybersecurity

Are you currently studying information security? Or are you considering transitioning to a career in cybersecurity? According to the US Bureau of Labor Statistics, cybersecurity jobs will grow 31 percent from 2019 to 2029—more than six times the national average ... continue reading

Empower an adaptive IT environment with Inside Azure for IT

In July, we announced Inside Azure for IT, an online technical skilling resource designed for cloud professionals to transform their IT operations with Azure best practices and insights. The team here has been so inspired by how many of you ... continue reading
MichaelKullish_0-1632940746924.png

Microsoft 365 Password Expiration Notification Email Solution for On-Premises AD Accounts

"Hello Again World!" Hi there! Mike Kullish, here. I'm a Microsoft Customer Engineer (CE) based just off the Gulf Coast of Florida with a focus on AD, Hyper-V and DFS, but I try to help customers with anything on the ... continue reading

Automate threat response with Azure Sentinel

Sarah Young joins Scott Hanselman to discuss updates to Azure Sentinel automation and how you can use it to accelerate and streamline threat response for your security operations.[0:00:00]– Introduction[0:02:41]– Azure Sentinel automation rules[0:06:15]– Automating responses with playbooks [0:09:30]– Playbook templates ... continue reading
Image demonstrating the integration with NC Protect and Microsoft Information Protection.

archTIS and Microsoft: Zero Trust information security for Microsoft Teams

Microsoft Teams has seen a surge in growth during the pandemic with over 115 million daily active users and growing.1 With it, customer imperative for enabling safe and trustworthy online collaboration has also increased significantly. The speed and simplicity of Teams ... continue reading

Humana leverages Microsoft Cloud for Healthcare to develop advanced predictive models

​​This blog post has been co-authored by Slawek Kierner, SVP of Enterprise Data & Analytics, Humana and Tie-Yan Liu, Assistant Managing Director, Microsoft Research China. Trips to the hospital happen. And while everyone in the industry strives to deliver world-class ... continue reading
AzureFunBytes Short - Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes Short – Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make up Azure. It's a chance for me to understand more about what people across the Azure organization do and how they do it. Every week ... continue reading
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
Deploying HTTP/3 on Windows Server at Scale

Deploying HTTP/3 on Windows Server at Scale

Windows Server 2022 was released for general availability last month. Since then, in cooperation with the Microsoft 365 team, we have started deploying the latest Windows Server on Exchange Online service front door servers globally, with a primary goal of ... continue reading

DevOps Lab | Hashicorp Series | Episode 2 | How to terraform everything

Welcome to the second episode in our HashiCorp series, Kyle Ruddy is back to show us how we can use terraform to manage both Azure and Github with code. While many people only use it to provision infrastructure, it actually ... continue reading
™

Azure network security helps reduce cost and risk according to Forrester TEI study

As organizations move their computing from on-premises to the cloud, they realize that leveraging cloud-native security tools can provide additional cost savings and business benefits to their security infrastructure. Microsoft Azure network security offers a suite of cloud-native security tools ... continue reading
ParseShadowStorage function

A closer look at the parsing code of a Crescendo output handler

In my previous post, I showed you how to parse the output from the netstat command. The output of netstat is not very complex. The goal of the post was to introduce some parsing strategies that you can use to ... continue reading
Pie graph showing DART engagement metrics by industry spanning from July 2020-June 2021. According to the graph, Consumer/Retail industry holds the highest engagement rate with 13 percent and Energy industry ranks the lowest at just 4 percent.

How cyberattacks are changing according to new Microsoft Digital Defense Report

In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading

Iran-linked DEV-0343 targeting defense, GIS, and maritime sectors

DEV-0343 is a new activity cluster that the Microsoft Threat Intelligence Center (MSTIC) first observed and began tracking in late July 2021. MSTIC has observed DEV-0343 conducting extensive password spraying against more than 250 Office 365 tenants, with a focus ... continue reading
Figure 1—maximum attack bandwidth (terabytes per second) in 2020 vs. August 2021 attack.

Business as usual for Azure customers despite 2.4 Tbps DDoS attack

This blog post was co-authored by Alethea Toh, Program Manager and Syed Pasha, Principal Network Engineer, Azure Networking. In early August, we shared Azure’s Distributed Denial-of-Service (DDoS) attack trends for the first half of 2021. We reported a 25 percent ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading

Add communications user experiences with Azure Communication Services

David de Matheu joins Scott Hanselman to show how the Azure Communication Services UI Library enables you to add communications capabilities to your applications with only a couple lines of code plus composable components and turn-key composites. [0:00:00]– Overview[0:00:49]– General ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
The five guiding principles of Decentralized Identities are: 1. Secure, reliable, and trustworthy; 2. Privacy protecting and in my control: 3. Inclusive, fair, and easy to use; 4. Supervisable; 5. Environmentally Responsible.

Microsoft’s 5 guiding principles for decentralized identities

Three years ago, as part of Microsoft’s mission to empower people and organizations to achieve more, we announced that we were incubating a new set of decentralized identity technologies based on a simple vision: Each of us needs a digital ... continue reading
Integration guidance helps partners deliver Zero Trust solutions

Integration guidance helps partners deliver Zero Trust solutions

Building a great product means listening to what our customers need, and we’ve heard loud and clear from our customers that Zero Trust adoption is more important than ever. In the 2021 Zero Trust Adoption Report, we learned that 96% ... continue reading
Get centralized visibility on all your customers and locations with Azure Lighthouse

Get centralized visibility on all your customers and locations with Azure Lighthouse

In this video, I had the chance to speak with Lior Kamrat (Senior Program Manager at Microsoft) about how to get centralized visibility & organization on all your customers and locations (hybrid and multicloud) with Azure Lighthouse and Azure Arc ... continue reading

Practical tips on how to use application security testing and testing standards

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Daniel Cuthbert, Global ... continue reading

DevOps Lab | Hashicorp Series | Episode 1 | Terraform 1.0

In this first episode of our Hashicorp series, Kyle Ruddy joins April to show how you can use terraform to manage both Azure and Github with code. While many people only use it to provision infrastructure, it actually manages all ... continue reading
Azure Monitor agent and Data Collection Rules

Azure Monitor agent and Data Collection Rules

Last week Sonia Cuff wrote about finding your Azure Log Analytics agent deployments in your environment in preparation for the Azure Monitor agent migration. This was in response to an email you might have received if you are currently using ... continue reading