Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Automate threat response with Azure Sentinel

Sarah Young joins Scott Hanselman to discuss updates to Azure Sentinel automation and how you can use it to accelerate and streamline threat response for your security operations.[0:00:00]– Introduction[0:02:41]– Azure Sentinel automation rules[0:06:15]– Automating responses with playbooks [0:09:30]– Playbook templates ... continue reading
Image demonstrating the integration with NC Protect and Microsoft Information Protection.

archTIS and Microsoft: Zero Trust information security for Microsoft Teams

Microsoft Teams has seen a surge in growth during the pandemic with over 115 million daily active users and growing.1 With it, customer imperative for enabling safe and trustworthy online collaboration has also increased significantly. The speed and simplicity of Teams ... continue reading

Humana leverages Microsoft Cloud for Healthcare to develop advanced predictive models

​​This blog post has been co-authored by Slawek Kierner, SVP of Enterprise Data & Analytics, Humana and Tie-Yan Liu, Assistant Managing Director, Microsoft Research China. Trips to the hospital happen. And while everyone in the industry strives to deliver world-class ... continue reading
AzureFunBytes Short - Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes Short – Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make up Azure. It's a chance for me to understand more about what people across the Azure organization do and how they do it. Every week ... continue reading
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
Deploying HTTP/3 on Windows Server at Scale

Deploying HTTP/3 on Windows Server at Scale

Windows Server 2022 was released for general availability last month. Since then, in cooperation with the Microsoft 365 team, we have started deploying the latest Windows Server on Exchange Online service front door servers globally, with a primary goal of ... continue reading

DevOps Lab | Hashicorp Series | Episode 2 | How to terraform everything

Welcome to the second episode in our HashiCorp series, Kyle Ruddy is back to show us how we can use terraform to manage both Azure and Github with code. While many people only use it to provision infrastructure, it actually ... continue reading
™

Azure network security helps reduce cost and risk according to Forrester TEI study

As organizations move their computing from on-premises to the cloud, they realize that leveraging cloud-native security tools can provide additional cost savings and business benefits to their security infrastructure. Microsoft Azure network security offers a suite of cloud-native security tools ... continue reading
ParseShadowStorage function

A closer look at the parsing code of a Crescendo output handler

In my previous post, I showed you how to parse the output from the netstat command. The output of netstat is not very complex. The goal of the post was to introduce some parsing strategies that you can use to ... continue reading
Pie graph showing DART engagement metrics by industry spanning from July 2020-June 2021. According to the graph, Consumer/Retail industry holds the highest engagement rate with 13 percent and Energy industry ranks the lowest at just 4 percent.

How cyberattacks are changing according to new Microsoft Digital Defense Report

In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading

Iran-linked DEV-0343 targeting defense, GIS, and maritime sectors

DEV-0343 is a new activity cluster that the Microsoft Threat Intelligence Center (MSTIC) first observed and began tracking in late July 2021. MSTIC has observed DEV-0343 conducting extensive password spraying against more than 250 Office 365 tenants, with a focus ... continue reading
Figure 1—maximum attack bandwidth (terabytes per second) in 2020 vs. August 2021 attack.

Business as usual for Azure customers despite 2.4 Tbps DDoS attack

This blog post was co-authored by Alethea Toh, Program Manager and Syed Pasha, Principal Network Engineer, Azure Networking. In early August, we shared Azure’s Distributed Denial-of-Service (DDoS) attack trends for the first half of 2021. We reported a 25 percent ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading

Add communications user experiences with Azure Communication Services

David de Matheu joins Scott Hanselman to show how the Azure Communication Services UI Library enables you to add communications capabilities to your applications with only a couple lines of code plus composable components and turn-key composites. [0:00:00]– Overview[0:00:49]– General ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
The five guiding principles of Decentralized Identities are: 1. Secure, reliable, and trustworthy; 2. Privacy protecting and in my control: 3. Inclusive, fair, and easy to use; 4. Supervisable; 5. Environmentally Responsible.

Microsoft’s 5 guiding principles for decentralized identities

Three years ago, as part of Microsoft’s mission to empower people and organizations to achieve more, we announced that we were incubating a new set of decentralized identity technologies based on a simple vision: Each of us needs a digital ... continue reading
Integration guidance helps partners deliver Zero Trust solutions

Integration guidance helps partners deliver Zero Trust solutions

Building a great product means listening to what our customers need, and we’ve heard loud and clear from our customers that Zero Trust adoption is more important than ever. In the 2021 Zero Trust Adoption Report, we learned that 96% ... continue reading
Get centralized visibility on all your customers and locations with Azure Lighthouse

Get centralized visibility on all your customers and locations with Azure Lighthouse

In this video, I had the chance to speak with Lior Kamrat (Senior Program Manager at Microsoft) about how to get centralized visibility & organization on all your customers and locations (hybrid and multicloud) with Azure Lighthouse and Azure Arc ... continue reading

Practical tips on how to use application security testing and testing standards

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Daniel Cuthbert, Global ... continue reading

DevOps Lab | Hashicorp Series | Episode 1 | Terraform 1.0

In this first episode of our Hashicorp series, Kyle Ruddy joins April to show how you can use terraform to manage both Azure and Github with code. While many people only use it to provision infrastructure, it actually manages all ... continue reading
Azure Monitor agent and Data Collection Rules

Azure Monitor agent and Data Collection Rules

Last week Sonia Cuff wrote about finding your Azure Log Analytics agent deployments in your environment in preparation for the Azure Monitor agent migration. This was in response to an email you might have received if you are currently using ... continue reading
netstat output

Converting string output to objects

In my previous post, I talked about using Crescendo to create a PowerShell module for the vssadmin.exe command in Windows. As I explained, you have to write Output Handler code that parses the output of the command you are using ... continue reading

Demystifying Azure Arc-enabled data services

Lior Kamrat joins Scott Hanselman to show how Azure Arc-enabled data services bring Azure data solutions – such as SQL Managed Instance and PostgreSQL Hyperscale – to your own infrastructure and how to modernize your data layer using Azure services, ... continue reading
Workflow from left to right showcasing the authentication process for how administrators, info workers, firstline workers, and consumers arrive at the Usability, Security, and Cost value additions for passwordless authentication.

3 key resources to accelerate your passwordless journey

Every organization today faces password-related challenges—phishing campaigns, productivity loss, and password management costs to name just a few. The risks now outweigh the benefits when it comes to passwords. Even the strongest passwords are easily phish-able and vulnerable to attacks, ... continue reading
Customized property permission = ExtendedRights in ActiveDirectoryRights

Understanding Get-ACL and AD Drive Output

Understanding Active Directory ACL using PowerShell can be a bit tricky. There are no out-of-the-box cmdlets with ActiveDirectory PowerShell module to help in settings the permission quickly. While there are no cmdlets, you can nevertheless manage AD permissions using the ... continue reading
Image shows arrows in a circle with steps in the supply chain process including plan, source, make, deliver, manage, service and decom. In the center of the circle is the word “capacity,” since each activity supports delivering capacity to customers. Underneath the circle is a box that says “systems and data enable end-to-end value chain of activities.” Together each activity in the circle informs the next to deliver continuous improvement.

Advancing reliability through a resilient cloud supply chain

“My Advancing Reliability series has explored many initiatives we’ve put in place to improve the reliability of the Azure platform. Today, I’d like to explore our cloud supply chain, as a resilient hardware infrastructure is critical to provide reliable capacity ... continue reading
How to find your Azure Log Analytics agent deployments in preparation for the Azure Monitor agent

How to find your Azure Log Analytics agent deployments in preparation for the Azure Monitor agent

If you have been using the Azure Log Analytics agent to monitor your Microsoft Azure virtual machines, you may have received an email stating that this functionality is being replaced by the Azure Monitor agent: Start using the Azure Monitor ... continue reading
Figure 1: Enabling DDoS Protection Standard on a hub virtual network in Azure Firewall Manager

Streamline your DDoS management with new Azure Firewall Manager capabilities

This post was co-authored by Alethea Toh, Program Manager, Azure Networking. As customers continue to adopt a Zero Trust security approach in their digital transformation, they often prefer a way to manage their network security policies and resources in one ... continue reading
Presenting Hardware Isolation of Microsoft Edge and Microsoft Office products. Workflow being displayed at the bottom with Device Hardware being the focal point, flowing through Kernel, into the Windows platform before reaching Microsoft Office, Microsoft Edge, and Apps.

Defend against zero-day exploits with Microsoft Defender Application Guard

Zero-day security vulnerabilities—known to hackers, but unknown to software creators, security researchers, and the public—are like gold to attackers. With zero-days, or even zero-hours, developers have no time to patch the code, giving hackers enough access and time to explore ... continue reading
Standardize DevOps practices across hybrid and multicloud environments

Standardize DevOps practices across hybrid and multicloud environments

In this video, I had the chance to speak with Jason Hansen (Principal Program Manager at Microsoft) about how you can use Azure Arc to standardize DevOps practices across hybrid and multicloud environments. In relation to Kubernetes, GitOps is the ... continue reading