Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19

On February 25, 2020, Microsoft Chief Information Security Officer (CISO) Bret Arsenault was attending the RSA Conference in San Francisco when the city declared a state of emergency because of COVID-19. Shortly after flying back to Seattle, Bret learned of ... continue reading
An image of the Arizona datacenter

Expanding cloud services: Microsoft launches its sustainable datacenter region in Arizona

Today we are launching our newest sustainable datacenter region in Arizona, known as “West US 3.” Datacenters are today’s engine for modern business, providing organizations of all sizes the cloud services and tools to innovate, collaborate, and operate securely and ... continue reading
An image of the Arizona datacenter

Expanding cloud services: Microsoft launches its sustainable datacenter region in Arizona

Today we are launching our newest sustainable datacenter region in Arizona, known as “West US 3.” Datacenters are today’s engine for modern business, providing organizations of all sizes the cloud services and tools to innovate, collaborate, and operate securely and ... continue reading
Immagine1.png

Cloud App Security: block TOR Browser (Anonymous IP)

Hi all, Alan here again with a new article, I’m a Customer Engineer from Italy on Identity and Security. I want to show you how to block TOR browser using Cloud App Security, simple and fast! During the last few ... continue reading
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via phishing and add forwarding rules, enabling these attackers to get access ... continue reading
Figure 1

How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure Functions

One of the top 10 Azure consuming companies has multiple country government-mandated requirements to block egress to and ingress from IP addresses and IP address ranges on a dynamic embargoed/sanctioned IP list. In other words, various country governments across the ... continue reading

How to rename a NIC

Q: Is there a simple way to rename a NIC, especially inside a Hyper-V VM? A: You can change the name of any Windows NIC using PowerShell – whether the NIC is in a physical host or a Hyper-V VM ... continue reading

Run your VMware workloads natively on Azure with Azure VMware Solution

Azure VMware Solution delivers a VMware environment as a service, which enables you to run native VMware workloads on Azure. Shannon Kuehn shows Scott Hanselman the seamless experience to migrate VMs directly from on-premises to Azure.[0:00:23]– Introduction[0:01:44]– Background[0:04:10]– Architecture[0:05:18]– Demo[0:15:02]– ... continue reading

How purple teams can embrace hacker culture to improve security

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Matthew Hickey, co-founder, CEO, and writer for Hacker ... continue reading
Introducing Azure AD access reviews for service principals

Introducing Azure AD access reviews for service principals

Howdy folks! With the growing trend of more applications and services moving to the cloud, there’s an increasing need to improve the governance of identities used by these workloads. Today, we’re announcing the public preview of access reviews for service ... continue reading
Group Policy Analytics

STIGing Made Easy – Microsoft Endpoint Manager

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. With my large customer base in the Microsoft Federal space and having to comply with internal security baselines ... continue reading

CRSP: The emergency team fighting cyber attacks beside customers

Microsoft Global Compromise Recovery Security Practice. We are a worldwide team of cybersecurity experts operating in most countries, across all organizations (public and private), with deep expertise to secure an environment post-security breach and to help you prevent a breach ... continue reading
PowerShell basics: Query Windows Server Event Logs

PowerShell basics: Query Windows Server Event Logs

One of the most standard server administration tasks is trawling through event logs looking for information about an issue you want to troubleshoot. If you’re interacting with Windows Server through PowerShell, you can interact with those event logs using the ... continue reading
A pie chart from S A P insider benchmark report. Survey finds that Azure remains the primary platform respondents look at when deploying S A P S 4 hana at 47 percent. A W S is preferred at 18 percent, Google Cloud is preferred at 21 percent, and other is preferred at 14 percent.

Why customers, including SAP, choose Azure for their SAP solutions

For over three years, I have had the privilege of leading the SAP solutions on Azure business at Microsoft and of partnering with outstanding leaders at SAP and with many of our global partners to ensure that our joint customers ... continue reading
The Azure Firewall solution as displayed in Azure Sentinel portal UI in the solution section.

Optimize security with Azure Firewall solution for Azure Sentinel

Security is a constant balance between proactive and reactive defenses. They are both equally important, and neither can be neglected. Effectively protecting your organization means constantly optimizing both prevention and detection. That’s why we’re excited to announce a seamless integration ... continue reading

Deploying Azure Static Web Apps with Azure DevOps

On this week's episode, April Edwards joins Damian for an introduction into the Azure Static Web App service and its differentiators as well as a demo of how to automate the deployment of Azure Static Web Apps using Azure DevOps.Jump ... continue reading
How to move your resources across regions and into Availability Zones using Azure Resource Mover

How to move your resources across regions and into Availability Zones using Azure Resource Mover

Azure always provides customers choice to select the region that best suits their needs. With the new service Azure Resource Mover, customers now have a platform level capability that allows them to move to new regions across the globe and ... continue reading
daribei_5-1622830917040.png

Azure Web App for Containers: Pulling a Container Image from ACR Without Exposing Credentials

Hello dear readers! My name is Daniel Ribeiro and I am a Customer Engineer working with Microsoft Mission Critical Team (SfMC). A customer of mine recently reported that when deploying a container using the Azure Web App, the Azure Container ... continue reading
Deep dive: Logging on to Windows

Deep dive: Logging on to Windows

Logging on to your computer is certainly faster than it used to be, yet there are a bunch of technical steps that happen in the background. At our ITOps Talk: All things hybrid event, senior developer Steve Syfuhs took us ... continue reading

Azure API for FHIR enables health organizations to deliver CMS Patient Access and Provider Directory APIs

On July 1, 2021, new requirements from the US Centers for Medicare and Medicaid Services (CMS) begin that require regulated payers to enable new Patient Access and Provider Directory APIs. While this change may be happening without a lot of ... continue reading
Create a host pool for Azure Active Directory

Azure Virtual Desktop: The flexible cloud VDI platform for the hybrid workplace

When we launched Windows Virtual Desktop nearly two years ago, no one predicted a global pandemic would force millions of workers to leave the office and work from home. Organizations around the world migrated important apps and data to the ... continue reading
magdysalem_0-1622676141054.png

How-To: Deploy Microservice Application with Secrets Store CSI Driver Using Helm Chart

In the last blog we discussed AKS Pod Identity and how we utilize this feature in our application and establish a secure access to Azure resources using Azure SDK libraries. One of disadvantage of using Pod Identity is in case ... continue reading
dns1.png

Faking DDNS with Azure Services

Hello folks, Since the beginning of the pandemic, we’ve all been mostly stuck to our home offices.  And since I’ve been concentrating of the hybrid services that Azure can provide I setup a simulated on-prem environment at home with left-over ... continue reading
Variable definitions in the Flow

Use Power Automate to Notify of Upcoming Azure AD App Client Secrets and Certificate Expirations

DisclaimerThe sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability ... continue reading

Automate and manage Azure AD tasks at scale with the Microsoft Graph PowerShell SDK

Howdy folks, We’ve heard from customers that having a great PowerShell experience is critical in helping manage your identity needs at scale from automating tasks through scripts to managing users in bulk. Today we wanted to share the investments we’re ... continue reading

From Server 2012 to AKS with Azure Migrate

Vinicius Apolinario is here to demo how to move apps from legacy to Azure on Azure Migrate. This new tooling helps containerize existing applications using Azure Migrate, an easy-to-use tool that removes the complexity involved in the containerization process. Jump ... continue reading
How to create a DataKeeper Replicated Volume that has Multiple Targets via CLI

How to create a DataKeeper Replicated Volume that has Multiple Targets via CLI

I often help people automate the configuration of their infrastructure so they can build 3-node clusters that span Availability Zones and Regions. The CLI for creating a DataKeeper Job and associated mirrors that contain more than one target can be ... continue reading

Understanding the threat landscape and risks of OT environments

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical Manager in ... continue reading
Video Tutorial: Endpoint Protection Part 8 - Windows Defender Application Control (WDAC) Policies

Video Tutorial: Endpoint Protection Part 8 – Windows Defender Application Control (WDAC) Policies

Hello everyone, here is part 8 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager integrates with Windows ... continue reading
VPN access to Azure from macOS with Azure Active Directory authentication

VPN access to Azure from macOS with Azure Active Directory authentication

Whether you are using Microsoft Azure for development, for production workloads, or for both, it's important to consider the security of the connections to those cloud systems. Virtual private networks are often used to encrypt traffic between a device and ... continue reading