Microsoft Cloud Library
Articles about Microsoft Cloud
Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.
Select a Topic to view articles of just that Topic. Select All to view the entire library.
Unlocking Azure Secrets: Using Identities for Key Vault Access
Azure Key Vault is essential for securely managing keys, secrets, and certificates. Managed Identities (MI) allow Azure resources to authenticate to any service that supports Azure AD authentication without any credentials in your code. For those looking to swiftly test ... continue reading
Agent recommendations for SCOM users
A SCOM user can currently use SCOM agent or Log Analytics agent (aka MMA) to monitor Virtual machines & send data to SCOM servers and optionally, send the data to Azure Log Analytics workspace. However, Microsoft has notified all Log ... continue reading
Remediate User Risks in Microsoft Entra ID Protection Through On-premises Password Changes
A Zero Trust breach prevention strategy based on user risk is critical for organizations in today's digital landscape. However, managing user risks in hybrid environments has posed several challenges. Today, we’re making it easier to manage user risk in hybrid ... continue reading
Protect SQL Server 2014 workloads with Azure flexibility
SQL Server has brought reliability and security to mission-critical workloads for 30 years. SQL Server 2022, released November 2022, delivers performance enhancements as well as Azure connectivity for disaster recovery, analytics, and governance. Now customers like Mediterranean Shipping Company (MSC) ... continue reading
Azure Firewall Tips from the Field
Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. In this post, I will provide some tips and clarifications about Azure Firewall based on my experience from the field. The following are the topics we ... continue reading
Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency
Virtual machines are arguably still one of the most fundamental core infrastructure components when it comes to cloud computing. Whether you are hosting databases, custom apps, runner jobs, or leveraging them as nodes for your container hosts, VMs are core ... continue reading
Infrastructure as Code Testing with Azure Policy
Have you ever wanted to test an ARM template or Bicep template against Azure Policy deployed in your environment – so that you could determine if the resource was going to be compliant or non-compliant? Or develop some tests against ... continue reading
Active Directory Hardening Series – Part 1 – Disabling NTLMv1
Active Directory Hardening Series - Part 1 – Disabling NTLMv1 Hello everyone, Jerry Devore back again after to along break from blogging to talk about Active Directory hardening. In my role at Microsoft, I have found every organization has ... continue reading
Azure AD Rename Rollout and Resources
The rename of Azure Active Directory (Azure AD) to Microsoft Entra ID is now rolling across content and product experiences from Microsoft, as per the implementation timeline outlined in the Azure AD rename announcement on July 11th. We expect ... continue reading

How we interact with information: The new era of search
In today’s rapidly evolving technological landscape, generative AI, and especially Large Language Models (LLMs), are ushering in a significant inflection point. These models stand at the forefront of change, reshaping how we interact with information. The utilization of LLMs for ... continue reading
Another Way To Personalize Multiple Thresholds in Log Analytics Alerts
Hi all, This article has been created for a customer that wants to be able to create an alert for customized thresholds for each existing server and performance counter. If there is no specific server, the alert need to ... continue reading
Microsoft Entra Internet Access: An Identity-Centric Secure Web Gateway Solution
In our previous blog, we introduced Microsoft’s identity-centric security service edge (SSE) solution and two new services: Microsoft Entra Private Access and Microsoft Entra Internet Access. This blog continues the series around Microsoft’s new SSE solution, where we’ll take a ... continue reading
Convert VMware VMs to Hyper-V faster with SCVMM
SCVMM has been your trusted datacenter management tool for years and with the latest hotfix (KB5030053) for SCVMM 2022 UR1, we are bringing you new enhancements which allow you to leverage SCVMM both as a V2V conversion tool and a ... continue reading
Another way to personalize multiple threshold in Log Analytics Alerts
Hi all, This article has been created for a customer that wants to be able to create an alert for customized thresholds for each existing server and performance counter. If there is no specific server, the alert need to use ... continue reading

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets
Since February 2023, Microsoft has observed password spray activity against thousands of organizations carried out by an actor we track as Peach Sandstorm (HOLMIUM). Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, ... continue reading
Real-world sustainability solutions with Azure IoT
In today’s fast-moving world, organizations are deploying innovative IoT and Digital Operations solutions that drive sustainable business practices, achieve energy conservation goals, and enhance operational efficiencies. I am amazed by their work and want to share a handful of recent ... continue reading

Uncursing the ncurses: Memory corruption vulnerabilities found in library
Microsoft has discovered a set of memory corruption vulnerabilities in a library called ncurses, which provides APIs that support text-based user interfaces (TUI). Released in 1993, the ncurses library is commonly used by various programs on Portable Operating System Interface ... continue reading
How Tenant Restrictions v2 Can be Used to Prevent Data Exfiltration
In a previous blog, we introduced Continuous Access Evaluation (CAE) - a product that brings Zero Trust principles to session management. Today we would like to discuss securing cross-tenant access with a focus on preventing data exfiltration. It’s impossible to imagine ... continue reading

Malware distributor Storm-0324 facilitates ransomware access
The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ... continue reading

Accelerating the pace of innovation with Azure Space and our partners
Today, I’m excited to share some news spanning the full spectrum of space industry use cases, including: Real-world examples of how Azure Orbital Ground Station is enabling both space agencies and start-ups with new ways to operate satellites in orbit. A ... continue reading
AKS Egress Traffic demystified
Welcome to this lab where we will explore the different outbound types in Azure Kubernetes Service (AKS). Outbound traffic refers to the network traffic that originates from a pod or node in a cluster and is destined for external ... continue reading

Cloud storage security: What’s new in the threat matrix
Today, we announce the release of a second version of the threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services. The matrix, first released in ... continue reading

Unlocking the potential of in-network computing for telecommunication workloads
Azure Operator Nexus is the next-generation hybrid cloud platform created for communications service providers (CSP). Azure Operator Nexus deploys Network Functions (NFs) across various network settings, such as the cloud and the edge. These NFs can carry out a wide ... continue reading

Cloud Cultures, Part 3: The pursuit of excellence in the United Kingdom
The swift progression of technological innovation is truly captivating. However, for me, what holds an even greater fascination is the intricate interplay of people, narratives, and life encounters that shape how technology is used every day. The outcomes of cloud ... continue reading
Driving performance and enhancing services across Three UK’s 5G network
In the ever-evolving landscape of mobile telecommunications, Three UK deploys cutting-edge technologies to drive performance and improve overall service quality. Leveraging their 5G network and the power of AIOps, Three UK is focusing on enhancing the customer experience for data ... continue reading
Automating Azure VM Deployment: The Power of PowerApps, SharePoint, Flow and Azure DevOps Pipe
Introduction Many of our customers are trying to balance the productivity vs security scale at this point in time. On the one end you can provide access to the Azure Portal but that could provide certain risks and requires an ... continue reading
Important: Update to deviceRegistrationPolicy Resource Type for MS Graph Beta API Version
We have an important update to provide on MS Graph Device Registration Policy resource type currently in preview and available in beta API version. We are making some changes to resource type properties that introduce breaking changes. These changes are ... continue reading
Cross-Tenant Access Settings Improvements!
Hello friends, Hard to believe it’s been almost a year since we made cross-tenant access settings generally available. Since then, it’s been awesome seeing you adopt this feature to secure your cross-tenant collaboration scenarios and improve end-user experiences for ... continue reading

Microsoft Azure confidential ledger: Enhancing customer trust in Azure’s hardware supply chain
Microsoft Azure hardware’s security posture is foundational to the security promises we make to our customers. The supply chain of Microsoft Azure servers relies on a multifaceted and complex ecosystem of partners across silicon production, assembly, systems integration, transit, and ... continue reading

PowerShell Adapter Feedback Provider
We’ve renamed the JSON Adapter Feedback Provider to PowerShell Adapter Feedback Provider! We heard some good feedback that the name wasn’t as descriptive to what the feedback provider does so we’ve changed it to be more consistent with its functionality ... continue reading