Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.


Unlocking Azure Secrets: Using Identities for Key Vault Access

Azure Key Vault is essential for securely managing keys, secrets, and certificates. Managed Identities (MI) allow Azure resources to authenticate to any service that supports Azure AD authentication without any credentials in your code.  For those looking to swiftly test ... continue reading

Agent recommendations for SCOM users

A SCOM user can currently use SCOM agent or Log Analytics agent (aka MMA) to monitor Virtual machines & send data to SCOM servers and optionally, send the data to Azure Log Analytics workspace. However, Microsoft has notified all Log ... continue reading
Remediate User Risks in Microsoft Entra ID Protection Through On-premises Password Changes

Remediate User Risks in Microsoft Entra ID Protection Through On-premises Password Changes

A Zero Trust breach prevention strategy based on user risk is critical for organizations in today's digital landscape. However, managing user risks in hybrid environments has posed several challenges. Today, we’re making it easier to manage user risk in hybrid ... continue reading

Protect SQL Server 2014 workloads with Azure flexibility

SQL Server has brought reliability and security to mission-critical workloads for 30 years. SQL Server 2022, released November 2022, delivers performance enhancements as well as Azure connectivity for disaster recovery, analytics, and governance. Now customers like Mediterranean Shipping Company (MSC) ... continue reading

Azure Firewall Tips from the Field

Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia.  In this post, I will provide some tips and clarifications about Azure Firewall based on my experience from the field.    The following are the topics we ... continue reading
Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency

Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency

Virtual machines are arguably still one of the most fundamental core infrastructure components when it comes to cloud computing. Whether you are hosting databases, custom apps, runner jobs, or leveraging them as nodes for your container hosts, VMs are core ... continue reading

Infrastructure as Code Testing with Azure Policy

Have you ever wanted to test an ARM template or Bicep template against Azure Policy deployed in your environment – so that you could determine if the resource was going to be compliant or non-compliant? Or develop some tests against ... continue reading

Active Directory Hardening Series – Part 1 – Disabling NTLMv1

Active Directory Hardening Series - Part 1 – Disabling NTLMv1   Hello everyone, Jerry Devore back again after to along break from blogging to talk about Active Directory hardening.  In my role at Microsoft, I have found every organization has ... continue reading
Azure AD Rename Rollout and Resources

Azure AD Rename Rollout and Resources

  The rename of Azure Active Directory (Azure AD) to Microsoft Entra ID is now rolling across content and product experiences from Microsoft, as per the implementation timeline outlined in the Azure AD rename announcement on July 11th. We expect ... continue reading
Generative AI use cases. Summarize massive quantitates of information for easier consumption & communication. Analyze and interpret data to uncover patterns, identify trends to gain valuable insights. Tailor interactions with individualized information to result in personalized output/recommendations. Automate repetitive tasks to streamline and be more productive.

How we interact with information: The new era of search

In today’s rapidly evolving technological landscape, generative AI, and especially Large Language Models (LLMs), are ushering in a significant inflection point. These models stand at the forefront of change, reshaping how we interact with information. The utilization of LLMs for ... continue reading

Another Way To Personalize Multiple Thresholds in Log Analytics Alerts

  Hi all, This article has been created for a customer that wants to be able to create an alert for customized thresholds for each existing server and performance counter.  If there is no specific server, the alert need to ... continue reading
Microsoft Entra Internet Access: An Identity-Centric Secure Web Gateway Solution

Microsoft Entra Internet Access: An Identity-Centric Secure Web Gateway Solution

In our previous blog, we introduced Microsoft’s identity-centric security service edge (SSE) solution and two new services: Microsoft Entra Private Access and Microsoft Entra Internet Access. This blog continues the series around Microsoft’s new SSE solution, where we’ll take a ... continue reading

Convert VMware VMs to Hyper-V faster with SCVMM

SCVMM has been your trusted datacenter management tool for years and with the latest hotfix (KB5030053) for SCVMM 2022 UR1, we are bringing you new enhancements which allow you to leverage SCVMM both as a V2V conversion tool and a ... continue reading

Another way to personalize multiple threshold in Log Analytics Alerts

Hi all, This article has been created for a customer that wants to be able to create an alert for customized thresholds for each existing server and performance counter.  If there is no specific server, the alert need to use ... continue reading
Peach Sandstorm 2023 tradecraft and attack flow diagram.

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Since February 2023, Microsoft has observed password spray activity against thousands of organizations carried out  by an actor we track as Peach Sandstorm (HOLMIUM). Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, ... continue reading

Real-world sustainability solutions with Azure IoT

In today’s fast-moving world, organizations are deploying innovative IoT and Digital Operations solutions that drive sustainable business practices, achieve energy conservation goals, and enhance operational efficiencies. I am amazed by their work and want to share a handful of recent ... continue reading
Screenshot of the infocmp utility code output

Uncursing the ncurses: Memory corruption vulnerabilities found in library

Microsoft has discovered a set of memory corruption vulnerabilities in a library called ncurses, which provides APIs that support text-based user interfaces (TUI). Released in 1993, the ncurses library is commonly used by various programs on Portable Operating System Interface ... continue reading
How Tenant Restrictions v2 Can be Used to Prevent Data Exfiltration

How Tenant Restrictions v2 Can be Used to Prevent Data Exfiltration

In a previous blog, we introduced Continuous Access Evaluation (CAE) - a product that brings Zero Trust principles to session management. Today we would like to discuss securing cross-tenant access with a focus on preventing data exfiltration.  It’s impossible to imagine ... continue reading
Diagram showing the Storm-0324 attack chain from the delivery of phishing email to the deployment of the JSSLoader DLL, after which access is handed off to Sangria Tempest

Malware distributor Storm-0324 facilitates ransomware access

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ... continue reading
Satellite dish sky sunset

Accelerating the pace of innovation with Azure Space and our partners

Today, I’m excited to share some news spanning the full spectrum of space industry use cases, including: Real-world examples of how Azure Orbital Ground Station is enabling both space agencies and start-ups with new ways to operate satellites in orbit. A ... continue reading

AKS Egress Traffic demystified

  Welcome to this lab where we will explore the different outbound types in Azure Kubernetes Service (AKS). Outbound traffic refers to the network traffic that originates from a pod or node in a cluster and is destined for external ... continue reading
Threat matrix with updated techniques included in reconnaissance, initial access, persistence, defense evasion, credential access, discovery, lateral movement, and exfiltration stages.

Cloud storage security: What’s new in the threat matrix

Today, we announce the release of a second version of the threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services. The matrix, first released in ... continue reading
Shows an example scenario of Far Edge, how scale up to handle load across servers.

Unlocking the potential of in-network computing for telecommunication workloads

Azure Operator Nexus is the next-generation hybrid cloud platform created for communications service providers (CSP). Azure Operator Nexus deploys Network Functions (NFs) across various network settings, such as the cloud and the edge. These NFs can carry out a wide ... continue reading
Watch Cloud Cultures: United Kingdom

Cloud Cultures, Part 3: The pursuit of excellence in the United Kingdom

The swift progression of technological innovation is truly captivating. However, for me, what holds an even greater fascination is the intricate interplay of people, narratives, and life encounters that shape how technology is used every day. The outcomes of cloud ... continue reading

Driving performance and enhancing services across Three UK’s 5G network

In the ever-evolving landscape of mobile telecommunications, Three UK deploys cutting-edge technologies to drive performance and improve overall service quality. Leveraging their 5G network and the power of AIOps, Three UK is focusing on enhancing the customer experience for data ... continue reading

Automating Azure VM Deployment: The Power of PowerApps, SharePoint, Flow and Azure DevOps Pipe

Introduction Many of our customers are trying to balance the productivity vs security scale at this point in time. On the one end you can provide access to the Azure Portal but that could provide certain risks and requires an ... continue reading

Important: Update to deviceRegistrationPolicy Resource Type for MS Graph Beta API Version

We have an important update to provide on MS Graph Device Registration Policy resource type currently in preview and available in beta API version. We are making some changes to resource type properties that introduce breaking changes. These changes are ... continue reading
Cross-Tenant Access Settings Improvements!

Cross-Tenant Access Settings Improvements!

Hello friends,   Hard to believe it’s been almost a year since we made cross-tenant access settings generally available. Since then, it’s been awesome seeing you adopt this feature to secure your cross-tenant collaboration scenarios and improve end-user experiences for ... continue reading
Flowchart of Provenance Verification using Hardware Root-of-Trust Identities.

Microsoft Azure confidential ledger: Enhancing customer trust in Azure’s hardware supply chain

Microsoft Azure hardware’s security posture is foundational to the security promises we make to our customers. The supply chain of Microsoft Azure servers relies on a multifaceted and complex ecosystem of partners across silicon production, assembly, systems integration, transit, and ... continue reading
Screenshot showing vm_stat suggestions.

PowerShell Adapter Feedback Provider

We’ve renamed the JSON Adapter Feedback Provider to PowerShell Adapter Feedback Provider! We heard some good feedback that the name wasn’t as descriptive to what the feedback provider does so we’ve changed it to be more consistent with its functionality ... continue reading