Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Microsoft Entra Change Announcements – March 2023 Train

Hello everyone,  Today, we're sharing our March train for feature and breaking changes. We also communicate these changes on release notes and via email. We are continuing to make it easier for our customers to manage lifecycle changes (deprecations, retirements, ... continue reading

PowerShellGet 3.0 Preview 20

We are excited to announce that an update to our preview of PowerShellGet 3.0 is now available on the PowerShell Gallery! This release includes a major refactor of the module to remove the dependency on the NuGet client APIs for ... continue reading
Managing and Optimizing Your Azure Hybrid Benefit Usage (With Tools!)

Managing and Optimizing Your Azure Hybrid Benefit Usage (With Tools!)

As more businesses shift their operations to the cloud, one of the challenges they face is optimizing licensing costs for their virtual machines (VMs) in the cloud. Microsoft's Azure Hybrid Benefit (AHUB) is a licensing benefit that can help businesses ... continue reading

Update XML files using PowerShell

There are many blogs on internet already speaking about updating XML files in PowerShell, but I felt need of one consolidated blog where complex XML files can also be updated with long complex hierarchy of XML nodes and attributes. Below ... continue reading

Latest Microsoft Entra advancements strengthen identity security

If you read behind the attention-grabbing headlines, most novel techniques rely on compromised identities.1 In fact, of all the ways an attacker can get into your digital estate, identity compromise is still the most common.2 This makes identity your first ... continue reading
Announcing the ITOpsTalk GitHub repo – A central location for IT/Ops related samples

Announcing the ITOpsTalk GitHub repo – A central location for IT/Ops related samples

Today we’re happy to announce the launch of the ITOpsTalk GitHub repo – a place on which the Modern Infrastructure Cloud Advocates team will host Infrastructure samples for anything related to Azure Infrastructure, Hybrid, Windows Server, Containers, etc. GitHub has ... continue reading
Screenshot of Cost analysis showing the Accumulated costs view in the Azure portal.

Microsoft Cost Management updates—March 2023

Whether you're a new student, a thriving startup, or the largest enterprise, you have financial constraints, and you need to know what you're spending, where it’s being spent, and how to plan for the future. Nobody wants a surprise when ... continue reading

Enhanced Azure Arc integration with Datadog simplifies hybrid and multicloud observability

Businesses today are managing complex, distributed environments and need a ubiquitous computing platform for all workloads that can meet them where they are. We’ve seen an increasing need for customers to not only deploy, manage, and operate across on-premises and ... continue reading

Migrating from Office 20162019 to Microsoft 365 Apps

Note: While we normally don’t cover this type of content on the Core Infrastructure and Security Blog, we thought this was important enough to provide our readers in order to support many Microsoft security capabilities.   Introduction Hello everyone, I ... continue reading

Microsoft Secure: Explore innovations transforming the future of security

Building a more secure future requires an end-to-end approach. There is no question that technology plays an essential role, but security will always be human-centered. That’s what Microsoft Secure is all about. It’s about sharing knowledge, best practices, and technology ... continue reading
2023 State of Cloud Permissions Risks report now published

2023 State of Cloud Permissions Risks report now published

As organizations are embracing and adopting multicloud infrastructures, identity permissions have increased across three leading cloud platforms: Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GPC). Although this shift brings new opportunities for innovation, it presents new permission ... continue reading
a man sitting at a table using a laptop

Accelerated Database Recovery enhancements in SQL Server 2022 

Part of the SQL Server 2022 blog series. We are excited to share that there are several Accelerated Database Recovery (ADR) enhancements in SQL Server 2022 that further improve the overall availability and scalability of the database, primarily around persistent version store ... continue reading

Microsoft Incident Response Retainer is generally available

The task of securing organizations is constantly changing and getting more complex. Many organizations don’t have the time, resources, or expertise to build an in-house incident response program. For customers that want help remediating an especially complex breach (or avoiding ... continue reading

Change Configuration Manager Site Server OS – Side-by-Side Migration Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading
Screenshots of Outlook on Windows showing how to set a custom sound that plays when a reminder is triggered

Guidance for investigating attacks using CVE-2023-23397

This guide provides steps organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2023-23397. A successful exploit of this vulnerability can result in unauthorized access to an organization’s environment by triggering a Net-NTLMv2 ... continue reading

Microsoft Entra Updates You May Have Missed

The second quarter of the Microsoft year saw several security feature updates for Microsoft Entra, as well as the announcement of general availability in a wide number of capability areas throughout the security space to help you improve your organization’s ... continue reading

Change Configuration Manager Site Server OS – High Availability Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading
Percentage chart showing 98 percent of cyberattacks are prevented by basic security hygiene and 50 percent of small businesses use personal devices to access work data.

Microsoft continues to innovate to help secure small businesses

Small and medium-sized businesses are at the heart of our economy and are dedicated to driving value for their customers, whether that means trying new recipes, exploring new inventory, expanding services, arranging the shop so it’s easier to navigate, or ... continue reading
Azure VMware Solution - Monitoring Quickstart Guide

Azure VMware Solution – Monitoring Quickstart Guide

Learn how easy it is to quickly set up some basic alerting and monitoring in your Azure VMware Solution environment.   In this video, I utilize the GitHub repository provided by Microsoft AVS experts available at Enterprise Scale for AVS Follow along ... continue reading
232868_AZ_ChatGPT_Announcement_R1_Blog_Banner_900x400 (1)

Modernize your apps and accelerate business growth with AI

AI has exploded in popularity in recent years, to the point where it’s no longer considered a luxury in the business world, but a necessity. A PricewaterhouseCoopers (PwC) study revealed that the adoption of AI will fuel a 14 percent ... continue reading
Chart demonstrating the segments of Microsoft's cloud-native application protection platform, including cloud security posture management, cloud workload protection, DevSecOps, and cloud infrastructure entitlement management.

The next wave of multicloud security with Microsoft Defender for Cloud, a Cloud-Native Application Protection Platform (CNAPP)

With digital transformation in the face of macroeconomic pressures, strategies to optimize both cloud environments and cloud security are increasingly appealing to enterprises. Organizations worry about vulnerabilities in code getting deployed, critical misconfigurations, overprivileged access to cloud infrastructure, and evolving ... continue reading

Microsoft recognized as a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Organizations need to protect their sensitive data including intellectual property, trade secrets, customer data, and personally identifiable information from both insiders and external cyber attackers. In fact, 80 percent of organizations experience more than one data breach in their lifetime.1 ... continue reading
Diagram showing the order of evaluation for network traffic with security admin rules and network security group rules.

Connect, secure, and simplify your network resources with Azure Virtual Network Manager

Enterprise-scale management and configuration of your network resources in Azure are key to keeping costs down, reducing operational overhead, and properly connecting and securing your network presence in the cloud. We are happy to announce Azure Virtual Network Manager (AVNM), your ... continue reading

Change Configuration Manager Site Server OS – In-place Upgrade Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading

Gain real-time identity protection with Microsoft and Recorded Future

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  You’ve implemented multifactor authentication for access to your enterprise network. But what if multifactor authentication isn’t as foolproof as you’re hoping? Are you comfortable ... continue reading
Customize your authentication flows with custom claims providers!

Customize your authentication flows with custom claims providers!

Howdy folks,  I’m super excited to announce the public preview of custom claims providers for Azure Active Directory (Azure AD), now part of Microsoft Entra.   A custom claims provider lets you call an API and map custom claims into ... continue reading
EDM Council CDMC Cloud Certified certification badge.

Microsoft achieves first native Cloud Data Management Capabilities certification

Today, Microsoft announced the successful completion of the Cloud Data Management Capabilities (CDMC) 14 Key Controls and Automations certification, conducted by Accenture and Avanade, accelerating the industry’s move to the cloud. The 14 Key Controls and Automations are a part ... continue reading
Screenshot of Microsoft Defender for IoT’s graphical user interface displaying the inventory of devices in the environment.

Leverage cloud-powered security with Microsoft Defender for IoT

Traditionally, operational technology (OT) and IT have occupied separate sides of enterprise security. But with digital transformation and the advent of Industry 4.0, the old, siloed approach is showing its age.1 The rise of manufacturing execution systems has enabled more ... continue reading

Decision Flow to Estimate Pod Spread on AKS

In Azure Kubernetes Service (AKS), the concept of pod spread is important to ensure that pods are distributed efficiently across nodes in a cluster. This helps to optimize resource utilization, increase application performance, and maintain high availability.   This article ... continue reading
Line chart showing trend of number of daily DDoS attacks targeting healthcare

KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks

In the last year, geopolitical tension has led to an uptick of reported cybercrime events fueled by hacktivist groups. The US Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn organizations about these attacks and teamed with the ... continue reading