Microsoft Cloud Library
Articles about Microsoft Cloud
Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.
Select a Topic to view articles of just that Topic. Select All to view the entire library.

Network ATC on Azure Stack HCI
Update: Network ATC is now publicly available with Azure Stack HCI 21H2 As you may be aware, Microsoft announced the general availability of the Azure-connected Hyper-Converged Infrastructure, Azure Stack HCI. Previously Azure Stack HCI was built off Windows Server which ... continue reading
Secure authentication method provisioning with Temporary Access Pass
Howdy folks, I’m happy to announce the general availability of Temporary Access Pass (TAP). We’ve made a lot of progress since we announced the public preview of TAP. “…We use the MS Authenticator for passwordless sign in. That is the ... continue reading
Detecting malicious key extractions by compromised identities for Azure Cosmos DB
Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog ... continue reading

Azure Orbital Ground Station as Service extends life and reduces costs for satellite operators
How can Microsoft empower satellite operators to focus on their mission and enable them to continue the operation of their satellites, without making capital investments in their ground infrastructure? To answer that question, Microsoft worked alongside the National Oceanic and ... continue reading
Microsoft Defender for Office 365 receives highest award in SE Labs Enterprise Email Security Services test
In today’s evolving threat landscape, email represents the primary attack vector for cybercrime, making effective email protection a key component of any security strategy.1 In Q1 2022, Microsoft participated in an evaluation of email security solutions, carried out by SE ... continue reading

MLOPs Blog Series Part 2: Testing robustness of secure machine learning systems using machine learning ops
Robustness is the ability of a closed-loop system to tolerate perturbations or anomalies while system parameters are varied over a wide range. There are three essential tests to ensure that the machine learning system is robust in the production environments: ... continue reading
Workflow Analyzer V2 Release
Workflow Analyzer V2 Download Link : Download Microsoft System Center Management Pack Tools from Official Microsoft Download Center Additional Links : Workflow Analyzer (v2) for SCOM - The Monitoring Guys After a resounding success of v1 (released in March 2021), ... continue reading

Improving AI-based defenses to disrupt human-operated ransomware
Microsoft’s deep understanding of human-operated ransomware attacks, which are powered by a thriving cybercrime gig economy, continuously informs the solutions we deliver to protect customers. Our expert monitoring of threat actors, investigations into real-world ransomware attacks, and the intelligence we ... continue reading
See how 3 industry-leading companies are driving innovation in a new episode of Inside Azure for IT
I had the awesome opportunity to talk with a few people innovating with some of the most exciting next-generation tech in our latest episode of the Inside Azure for IT fireside chat series. Many of us, myself included, spend a ... continue reading

Responsible AI investments and safeguards for facial recognition
A core priority for the Cognitive Services team is to ensure its AI technology, including facial recognition, is developed and used responsibly. While we have adopted six essential principles to guide our work in AI more broadly, we recognized early ... continue reading

Securing your IoT with Edge Secured-core devices
A recent study conducted by Microsoft in partnership with Ponemon Institute included a survey of companies that have adopted IoT solutions and 65 percent of them mentioned that security is a top priority when implementing IoT. Attacks targeting IoT devices ... continue reading
Azure IoT increases enterprise-level intelligent edge and cloud capabilities
For Microsoft Azure IoT, our approach is connecting devices at the edge to the cloud seamlessly and securely to help customers achieve desired business outcomes. At this year’s Embedded World 2022, we’ll share how our Azure IoT solutions are delivering ... continue reading

What’s new with SQL Tools
Hello community, the June release of Azure Data Studio 1.37 is here! We are also excited to announce the release of SQL Server Management Studio (SSMS) 18.12. In this Azure Data Studio release, backup and restore to URL was introduced ... continue reading
Learn Microsoft Azure for system administrators & solution architects with Azure Skills Navigator
If you’re wanting to learn the foundations of Microsoft Azure (including cloud computing concepts, Azure’s structure, and its product range), you might start out with training materials like the Azure Fundamental learning paths on Microsoft Learn. These will also give ... continue reading

Default site boundary group behavior to support cloud source selection
You can now add options via PowerShell to include and prefer cloud management gateway (CMG) management points for the default site boundary group. When a site is set up, there's a default site boundary group created for each site and ... continue reading
Why strong security solutions are critical to privacy protection
The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Voice of the Community blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Ann ... continue reading

Recapping recent updates to client tools in SQL Server
Hello from the SQL Experiences team! As a follow-up to Microsoft Build at the end of May, we thought it was a good time to highlight recent updates for client tools, as we've had quite a few.First, in alignment with ... continue reading

Simplify and centralize network security management with Azure Firewall Manager
We are excited to share that Azure Web Application Firewall (WAF) policy and Azure DDoS Protection plan management in Microsoft Azure Firewall Manager is now generally available. With an increasing need to secure cloud deployments through a Zero Trust approach, ... continue reading

Discover how you can innovate anywhere with Azure Arc
Welcome to Azure Hybrid, Multicloud, and Edge Day—please join us for the digital event. Today, we’re sharing how Azure Arc extends Azure platform capabilities to datacenters, edge, and multicloud environments through an impactful, 90-minute lineup of keynotes, breakouts, and technical ... continue reading

Azure powers rapid deployment of private 4G and 5G networks
As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading

Azure powers rapid deployment of private 4G and 5G networks
As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading

MLOps Blog Series Part 1: The art of testing machine learning systems using MLOps
Testing is an important exercise in the life cycle of developing a machine learning system to ensure high-quality operations. We use tests to confirm that something functions as it should. Once tests are created, we can run them automatically whenever ... continue reading

The many lives of BlackCat ransomware
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy. It’s noteworthy due to its unconventional programming language (Rust), multiple target devices and possible entry points, and affiliation ... continue reading
Azure DDoS Protection Standard Costs Estimation
If you are considering the activation of Azure DDoS Protection Standard – a great solution to better protect your Azure Virtual Network (VNet) resources from DDoS attacks – you may ask yourself: Which VNet(s) should you enable the service in? ... continue reading
Supporting openEHR with Azure Health Data Services
This blog post is co-authored by Trent Norris, Cloud and Data Partner Alliances, HLS. This blog is part of a series in collaboration with our partners and customers leveraging the newly announced Azure Health Data Services. Azure Health Data Services, ... continue reading
Managing, governing, and securing identities for apps and services
Hi everyone, When we talk to customers, we often get to dig deep into the details of marquee Azure Active Directory (Azure AD) features like conditional access, identity protection, and identity governance to secure user population. We know that for ... continue reading

Achieve seamless observability with Dynatrace for Azure
This blog post has been co-authored by Manju Ramanathpura, Principal Group PM, Azure DevEx & Partner Ecosystem. As adoption of public cloud grows by leaps and bounds, organizations want to leverage software and services that they love and are familiar ... continue reading

Learn what’s new in Azure Firewall
This post was co-authored by Suren Jamiyanaa, Program Manager 2, Azure Networking. We continue to be amazed by the adoption, interest, positive feedback, and the breadth of use cases customers are finding for our service. Today, we are happy to ... continue reading
Find the clarity and guidance you need to realize cloud value
A modernized cloud workload offers significant benefits—including cost savings, optimized security and management, and opportunities for ongoing innovation. But the process of migrating and modernizing workloads can be challenging. That’s why it’s essential to prepare and plan ahead—and to ensure ... continue reading
SCOM MP for M365 – V3 CTP
We are back with the latest version (in CTP) of M365 MP and have very exciting changes to talk about. With this update, Users can now opt between their choice of MP Authentication i.e., Application (which is available currently), Delegated ... continue reading