Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Is a User A Local Administrator?

Q: Some of the things we do in our logon scripts require the user to be a local administrator. How can the script tell if the user is a local administrator or not, using PowerShell 7. A: Easy using PowerShell ... continue reading
Eric_Woodruff_0-1618498906985.png

Hybrid Identity: Getting Users Aligned

Hey folks, Eric Woodruff here – Customer Engineer still living and breathing in the world of Azure Active Directory. Today we are going to dive into the specifics of how user accounts in Active Directory are matched to user accounts ... continue reading
Architectural diagram displaying CyberMDX integrating with Microsoft Defender for Endpoint.

CyberMDX and Microsoft: Protecting life-saving medical devices

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA. While hospitals continue to battle the COVID-19 pandemic, many are battling other “viruses” behind the scenes. Malware, ransomware, and phishing attacks against healthcare delivery ... continue reading
Using the Serial Console on Windows IaaS VMs

Using the Serial Console on Windows IaaS VMs

If you make a mistake when configuring operating system firewall rules that block you from accessing the VM, or a service is stopping an IaaS VM from booting, or some other configuration problem such as a newly installed application is ... continue reading
Making MsQuic Blazing Fast

Making MsQuic Blazing Fast

It’s been a year since we open sourced MsQuic and a lot has happened since then, both in the industry (QUIC v1 in the final stages) and in MsQuic. As far as MsQuic goes, we’ve been hard at work adding ... continue reading
Stop typing PowerShell credentials in demos using PowerShell SecretManagement

Stop typing PowerShell credentials in demos using PowerShell SecretManagement

We all sometimes create presentations with some PowerShell demos. And often, we need to use credentials to log in to systems for example PowerShell when delivering these presentations. This can lead that we don't use very strong passwords because we ... continue reading
Screen view of security recommendations for network devices and the suggested remediation procedure. Here network device 3 has critical CVEs.

Secure unmanaged devices with Microsoft Defender for Endpoint now

As we have entered into new hybrid work environments, businesses need to think about how they will proactively protect their organizations from the influx of new or “bring your own” (BYO) connected devices. This new normal has exposed the most ... continue reading
magdysalem_1-1618267540439.png

How-To: Deploy Microservice Application with Pod Identity Using Helm Chart

In the last blog we discussed how to deploy AKS fully integrated with AAD. Also we discussed deploying add-on for Azure Pod Identity and Azure CSI driver. In the article we will discuss how to create an application that using ... continue reading

On Prem To The Cloud: Migrating to Azure SQL (episode 7)

Our customers have been wanting some more basic, getting started material on taking their on prem applications and moving them to the cloud. This video series does just that. Starting with a simple on prem solution, lifting and shifting and ... continue reading
Research prototype for high-level network deployment

Empowering operators on their cloud migration journey

For operators, many challenges can be involved in their journey to the cloud, some more complex than others. Here, it is important to note that when it comes to operators’ path to cloud migration, there is no such thing as ... continue reading
Adding a dynamic membership rule to a group in the Azure Portal

Dynamic Groups in Azure AD and Microsoft 365

When I first started in IT, my large organization had an entirely separate "Data Security" team who were responsible for user management - adds/moves/deletes and password resets. They were a small but busy team, handling both calls from users via ... continue reading
Hierarchy of IoT Edge devices to extract data from the automation pyramid

Build secure manufacturing operations with nesting capabilities for Azure IoT Edge

The manufacturing industry continues to rapidly adopt Internet of Things (IoT) technology to optimize productivity, gain efficiencies, increase uptime, and meet sustainability goals. As organizations look to harness IoT across their ecosystems of connected devices, security and compliance continue to ... continue reading
Investigating a unique “form” of email delivery for IcedID malware

Investigating a unique “form” of email delivery for IcedID malware

Microsoft threat analysts have been tracking activity where contact forms published on websites are abused to deliver malicious links to enterprises using emails with fake legal threats. The emails instruct recipients to click a link to review supposed evidence behind ... continue reading

Diagnose and solve problems with Azure API Management Diagnostics

Khaled Zayed joins Scott Hanselman to show how to troubleshoot availability, performance, and policy issues in your API Management service using API Management Diagnostics.[0:00:00]– Introduction[0:03:43]– Demo: Troubleshooting Availability and Performance[0:07:49]– Demo: Troubleshooting Gateway Performance[0:11:59]– Demo: Troubleshooting API Policies[0:13:54]– Wrap-upAzure API ... continue reading
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
pshl-1.png

Leveraging PowerShell SecretManagement to generalize a demo environment

Hello Folks, I’ve been working with some colleagues on a shared demo environment, and one issue came up during a session with customers that highlighted a problem.  If any of us change the local admin password of the servers or ... continue reading
Gamifying machine learning for stronger security and AI models

Gamifying machine learning for stronger security and AI models

To stay ahead of adversaries, who show no restraint in adopting tools and techniques that can help them attain their goals, Microsoft continues to harness AI and machine learning to solve security challenges. One area we’ve been experimenting on is ... continue reading
WhoIAM: Enabling inclusive security through identity protection and fraud prevention

WhoIAM: Enabling inclusive security through identity protection and fraud prevention

Greetings, This is Sue Bohn, Director of Program Management for Identity and Access Management. In this Voice of the Partner blog post, we’ve invited Ajith Alexander, Head of Product Management at WhoIAM, a leading identity and access management (IAM) company, ... continue reading
AndrewCoughlin_0-1617796048972.jpeg

Azure Files: Single Forest Multiple Domain Setup Troubleshooting

Hello everyone, this is Andrew Coughlin and I am a Customer Engineer at Microsoft focusing on Azure IaaS. In this blog I will be discussing an issue I came across while working with one of my customers. I was working ... continue reading

On Prem To The Cloud: Migrating to App Service (episode 6)

Our customers have been wanting some more basic, getting started material on taking their on prem applications and moving them to the cloud. This video series does just that. Starting with a simple on prem solution, lifting and shifting and ... continue reading
Optimizing your $Profile

Optimizing your $Profile

Your PowerShell Profile allows you to customize your PowerShell session and runs at startup. Complex profiles can cause a significant delay in the startup of PowerShell as it is a script that needs to be executed before the prompt first ... continue reading
Enterprise-scale foundation architecture

Leverage enterprise-scale reference implementations for your cloud adoption

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure In the last couple of blog posts, we followed Tailwind Traders1 on their cloud journey and how the IT team is looking to adopt Azure as part of their ... continue reading
Raising the minimum bar with Azure Automanage

Raising the minimum bar with Azure Automanage

Hello Folks, I’ve always believed that one of the true roles of IT in any organizations is to help the business units achieve their goals while maintaining adequate control over company resources. This is not an all-encompassing rule. It’s just ... continue reading
Microsoft Defender for Endpoint now supports Windows 10 on Arm devices

Microsoft Defender for Endpoint now supports Windows 10 on Arm devices

Today, we are excited to announce that Microsoft Defender for Endpoint support of Windows 10 on Arm devices is generally available. This expanded support is part of our continued efforts to extend Microsoft Defender for Endpoint capabilities across all the ... continue reading

Protect your business from email phishing with multi-factor authentication

Cybersecurity has been in the news far more often in the past 12 months than in previous years, as cybercriminals escalated their activity during the COVID-19 pandemic quarantine. The seismic shift of hundreds of millions of people connecting and working ... continue reading
bwatts670_0-1617478804224.png

Exploring Anomalies with Log Analytics using KQL

Detecting anomalies in your data can be a very powerful and desired functionality. Within Azure Monitor we provide a really easy method to alert on Anomalies if they are coming from Metrics (Creating Alerts with Dynamic Thresholds in Azure Monitor ... continue reading

Building a balancing robot with Azure Sphere

Mike Hall shows Scott Hanselman how his team built a self-balancing robot using Azure Sphere and Azure RTOS that can be controlled and updated remotely from Azure IoT Central. In addition, the robot supports deferred updates for the OS and ... continue reading

Testing the connection to computers in the Active Directory

Q: As an administrator, I often have to do a lot of reporting on the servers in my domain. Is there a simple way to test the connection to every server in my domain or every server or client host ... continue reading
Attack diagram showing stages of an attack and how the threat actor tracking model caught the initial stages so the affected organization could stop the attack

Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting

As seen in recent sophisticated cyberattacks, especially human-operated campaigns, it’s critical to not only detect an attack as early as possible but also to rapidly determine the scope of the compromise and predict how it will progress. How an attack ... continue reading
AI-powered interactive assistant in the Azure CLI

AI-powered interactive assistant in the Azure CLI

As you know, the Azure CLI already AI-build in with the az find command, and you might have seen the great feature like AI-powered PowerShell module called Az Predictor Module (Azure PowerShell Predictions), which does what the name says, predict ... continue reading