Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.


Risky Business in Azure AD…

Hi all, Zoheb here publishing on behalf of a guest author, Morne Naude. So without further ado... Hi Everyone, Morne here again and welcome to the first blog in our series on Azure Active Directory Security where we will be ... continue reading

How Azure App Configuration helps developers roll out new features

Jimmy Campbell is back to show Scott Hanselman how to use App Configuration for feature management. Traditionally, shipping a new application feature requires a complete redeployment of the application itself, and testing a feature often requires multiple deployments of the ... continue reading

Az Update: AzureAD My Sign-In, Azure Monitor supports Kubernetes, Azure Sentinel news and more

Another week, another ton of Azure to share. Here are some of the headlines we're covering this week: SOC operational metrics now available in Azure Sentinel, Azure Monitor for containers with Azure Portal now supports Kubernetes resource view, Azure AD ... continue reading

Learning How to Transition Your SQL Server Skills to Azure SQL | Data Exposed

The Azure Data team at Microsoft recently launched FOUR new ways for you to learn Azure SQL. They'll show you how to translate your existing SQL Server expertise to Azure SQL including Azure SQL Database and Azure SQL Managed Instance ... continue reading
An image showing each function works as part of a whole security team, within the organization, which is part of a larger security community defending against the same adversaries.

How to organize your security team: The evolution of cybersecurity roles and responsibilities

Digital transformation, cloud computing, and a sophisticated threat landscape are forcing everyone to rethink the functions of each role on their security teams, from Chief Information Security Officers (CISOs) to practitioners. With billions of people around the globe working from ... continue reading

Zero Trust: From security option to business imperative overnight

Not long ago when I spoke with customers about Zero Trust, our conversations focused on discussing the principles, defining scope, or sharing our own IT organization’s journey. Zero Trust was something interesting to learn about, and most organizations were very ... continue reading
Azure Migrate Features.

Prioritize datacenter discovery and readiness assessments to accelerate cloud migration

Cloud migrations are an effective way to drive operational efficiencies and to flip capital expenses to operational. Successful cloud migrations are rooted in bias towards action and execute with urgency towards triggers that need immediate attention. In our experience, migration ... continue reading
Assess your AWS virtual machines with Azure Migrate

Assess your AWS virtual machines with Azure Migrate

Over the last few months I’ve been doing a “summer tour” of user groups and delivering a talk entitled “Start your datacentre transformation journey with Azure Migrate”, during my talk I mainly focus on customer journeys that are moving resources ... continue reading

Afternoon Cyber Tea: Revisiting social engineering: The human threat to cybersecurity

Most of us know ‘Improv’ through film, theatre, music or even live comedy. It may surprise you to learn that the skills required for improvisational performance art, can also make you a good hacker? In cybersecurity, while quite a bit ... continue reading
An image for the different setup modes of work and personal profiles.

Associate Microsoft and Pradeo to manage and secure Android Enterprise mobile devices

Want to learn more on how Android Enterprise works with existing mobility management and security solutions? This article will explain how Android Enterprise fits in a standard mobile ecosystem made of Microsoft Endpoint Manager solution and Pradeo Security Mobile Threat ... continue reading

Johnson Controls simplifies remote access to legacy, on-prem apps with Azure AD and F5 BIG-IP APM

For organizations that operate a hybrid environment with a mix of on-premises and cloud apps, shifting to remote work in response to COVID-19 has not been easy. VPN solutions can be clumsy and slow, making it difficult for users to ... continue reading

Configuring backup storage redundancy in Azure SQL Managed Instance

Database backups are an essential part of any business continuity and disaster recovery strategy, because they protect your data from corruption or deletion. In Azure SQL Managed Instance there are two types of automated backups that customers can use for ... continue reading

How the Microsoft Mission Critical Team Helped Secure AAD

Hello everyone and welcome to our mind-blowing series of blogs we have lined up to show you the significant impact of the Azure Active Directory Security Features had for one of our SMC customer. This blog is a cumulative effort ... continue reading
Azure Monitor for Azure Arc enabled servers

Azure Monitor for Azure Arc enabled servers

As you know Azure Arc for servers is currently in preview and allows you to manage your Windows and Linux machines hosted outside of Azure on your corporate network or other cloud providers, similar to how you manage native Azure ... continue reading

CISO Stressbusters: Post #4: 4 tips for running a highly effective security operation

Rebecca Wynn, Global CISO & Chief Privacy Officer (CISO) of (24), shares her advice for relieving stress in today’s CISO Stressbuster post. In many organizations, CISO is held accountable for security breaches, yet they don’t have control over all the ... continue reading

Johnson Controls simplifies remote access to legacy, on-premises apps with Azure AD and F5 BIG-IP AP

For organizations that operate a hybrid environment with a mix of on-premises and cloud apps, shifting to remote work in response to COVID-19 has not been easy. VPN solutions can be clumsy and slow, making it difficult for users to ... continue reading

Performance in a DevOps World with Flood

How do you incorporate load testing into your DevOps pipeline? In this episode, Tim Koopmans walks us through the steps of writing a browser-based load testing script using Flood Element, adding it as a task in Azure Pipelines, and ramping ... continue reading
Creating a traditional Windows Server Failover Cluster in Azure

Creating a traditional Windows Server Failover Cluster in Azure

Hello Folks, As we announced last month (Announcing the general availability of Azure shared disks and new Azure Disk Storage enhancements) Azure shared disks are now generally available. Shared disks, is the only shared block storage in the cloud that ... continue reading
Microsoft Authenticator app lock now enabled by default

Microsoft Authenticator app lock now enabled by default

Howdy folks, We’re always listening to your feedback about Microsoft Authenticator and what we can do to make the app more secure and easier for end users. A few years ago, we released our App Lock feature in response to ... continue reading
Azure AD Mailbag: Identity protection

Azure AD Mailbag: Identity protection

Greetings! We're back with another mailbag, this time focusing on your common questions regarding Azure AD Identity Protection. Security is always top of mind and Identity Protection helps you strike a balance between the usability required for end users to ... continue reading

Microsoft Defender ATP Daily Operation – Part 1

Hello IT Pros, I have combined the information for Security Team who monitor, respond and manage ATP Portal on a daily basis. Please check it out and give your feedback. =================== ALERT MANAGEMENT The Alert response could be done as ... continue reading

Microsoft Advanced Threat Protection for Linux

Microsoft Defender Advanced Threat Protection (MD ATP) support for Linux with kernel version 3.10.0-327 or later, including the following Linux flavours : Red Hat Enterprise Linux 7.2 or higher CentOS 7.2 or higher Ubuntu 16.04 LTS or higher LTS Debian ... continue reading
Windows Virtual Desktop blade in the Azure Portal

Az Update: New Windows Virtual Desktop capabilities, NFS support for Azure Blob Storage, and more!

This week some important Windows Virtual Desktop features moved to be generally available (hello audio and video redirection!), the Android Remote Desktop client now also supports WVD and Azure AD App Proxy now supports the Remote Desktop Services web client, ... continue reading
Syntax Highlighting Bugs

Semantic Highlighting in the PowerShell Preview extension for Visual Studio Code

Hi everyone! I’m Justin and I am currently an intern on the PowerShell team. One of my projects was to add PowerShell semantic highlighting support in VS Code allowing for more accurate highlighting in the editor. I’m excited to share ... continue reading

Introducing the next generation of Azure Stack HCI

Scott Hanselman sits down with Cosmos Darwin to learn about Azure Stack HCI, which is a new host operating system for hyperconverged infrastructure. Delivered as an Azure service, Azure Stack HCI provides the latest and up to date security, performance, ... continue reading

Video Tutorial: App-V 5.0 Client – Application Deployment Part 14

Hello everyone, here is part 14 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by , a Microsoft principal premier field engineer. These tutorials are from our library and use Configuration Manager 2012 in ... continue reading

Azure SQL – Automated Backups (Part 2) | Data Exposed

In the last part of this two-part series, Shreya Verma takes a deeper dive into backup options by showing us point-in-time, long-term retention, and geo restore demos. To learn about the different backups options Azure SQL provides and how to ... continue reading
How to Manage SharePoint via PowerShell - Part 2

How to Manage SharePoint via PowerShell – Part 2

To get all the lists & libraries in a site, run Get-PnPList. Note there's no "Get-PnPLibrary" cmdlet because under the hood, everything is a "list". If you wish to differentiate what you want (list, library, or any other type available), ... continue reading

Turn Off “Automatically Dismiss Lock Screen When Face is Recognized” At Scale

Windows Hello in Windows 10 is a biometric means of recognizing a user and authenticating them to a device using a fingerprint, secure PIN, or face recognition. If a personal or corporate device is capable of face recognition, it can ... continue reading
Diagram showing an attack chain involving attack sprawl and techniques like overpass-the-hash

Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

In theory, a cyberattack can be disrupted at every phase of the attack chain. In reality, however, defense stack boundaries should overlap in order to be effective. When a threat comes via email, for example, even with good security solutions ... continue reading