Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

One Ops Question: What are Azure Blueprints?

One Ops Question: What are Azure Blueprints?

In this episode of One Ops Question, Steven Murawski answers the question "What are Azure Blueprints?" The cloud can be a scary, wide-open space. Azure Blueprints helps bring structure to your enterprise's use of Azure subscriptions with RBAC, Azure Policy, ... continue reading
Az Update: Azure Firewall Manager, Azure VMware Solutions, Cost Management and more!

Az Update: Azure Firewall Manager, Azure VMware Solutions, Cost Management and more!

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
One Ops Question:  What are the common Azure Stack Hub use cases

One Ops Question: What are the common Azure Stack Hub use cases

Azure Stack Hub is an extension of Azure that provides a way to run apps in an on-premises environment and deliver Azure services in your datacenter. In this episode of One Ops Question Thomas Maurer talks about the different use ... continue reading
Video Tutorial: Packages behind the scenes - Application Deployment Part 6

Video Tutorial: Packages behind the scenes – Application Deployment Part 6

Hello everyone, here is part 6 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 ... continue reading

The world is your authentication and identity oyster

This blog post is part of the Microsoft Intelligence Security Association guest blog series. To learn more about MISA, go here. The world is your authentication/identity oyster If you’re older than 10 years of age you’ve undoubtedly heard the phrase ... continue reading
One Ops Question: How can I simplify management of my Windows Servers on-prem and Azure?

One Ops Question: How can I simplify management of my Windows Servers on-prem and Azure?

Today Sarah answers a questions that is on every on-prem IT person. When you have systems in all kinds of different location and platform how do you keep track of them all without going nuts? how do you tame the ... continue reading

Why Azure SQL is Best for Developers (Part 1) | Data Exposed

Azure SQL has a lot of built-in features that make it the best database in the cloud for developers. In this first part of this two-part series, Davide Mauri discusses what those features are and which kinds of customers can ... continue reading

Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Recently, Microsoft announced our acquisition of CyberX, a comprehensive network-based security platform with continuous threat monitoring and analytics. This solution builds upon our commitment to provide a unified IoT security solution that addresses connected devices spread across both industrial and ... continue reading
Plan your migration to Azure VMware Solution using Azure Migrate 1

Plan your migration to Azure VMware solution using Azure Migrate

Azure Migrate now supports assessments for Azure VMware Solution (AVS), providing even more options for you to plan your migration to Azure. AVS enables you to run VMware natively on Azure. AVS provides a dedicated Software Defined Data Center (SDDC) ... continue reading

Premier Offerings: WorkshopPLUS Azure Security Best Practices

G ‘day, I am Vic Perdana, Sr. PFE based in Melbourne, Australia. As COVID-19 forces people to work from home, the number of bad actors is ramping up as demonstrated by the increase of cyber-attacks globally, it is becoming *very* ... continue reading

Elastic Jobs in Azure SQL Database (Part 2) | Data Exposed

In the second part of this two-part video series, Kate Smith discusses what two things you should understand before beginning with Azure SQL Database Elastic Jobs: Idempotence, and Credentials. We explain why they are important and how to think about ... continue reading

Elastic Jobs in Azure SQL Database (Part 1) | Data Exposed

In the first part of this two-part video series, Kate Smith gives an introduction to what Azure SQL Database Elastic jobs are, and when you should consider using them, as well as what products support Elastic Jobs. Watch on Data ... continue reading

Azure SQL Zone Redundant Configuration for High Availability | Data Exposed

In this video, Emily Lisa and Anna Hoffman discuss how to make a database zone redundant in Azure SQL, and the High Availability benefits of the zone redundant configuration. Watch on Data Exposed Additional Resources: High-availability and Azure SQL Database ... continue reading

Private Link for Azure SQL Database (Part 2) | Data Exposed

In the second part of this two-part video segment, Rohit Nayak dives deeper into the new capabilities for Azure SQL Database for Private Endpoints. Learn more about what Private Endpoint for Azure SQL Database is in the first episode. Watch ... continue reading

Private Link for Azure SQL Database (Part 1) | Data Exposed

In the first part of this two-part video segment, Rohit Nayak explains what Private Endpoint for Azure SQL Database is and how it relates to the overall connectivity story for Azure SQL. Watch on Data Exposed Additional Resources: Learn more ... continue reading

How Fidelity Investments enabled Azure at scale for their developers

Maintaining an elevated level of security and governance in regulated industries like financial services can introduce complexity and friction. Geoff Langfield from Fidelity Investments joins Scott Hanselman to show how they're eliminating this friction by using automation to onboard their ... continue reading
Unified search experience across users, devices, applications, and administrative units.

Streamline admin, developer, and end-user experiences—June identity updates

Howdy folks, I'm excited to share new Azure Active Directory (Azure AD) enhancements that will streamline administrator, developer, and end-user experiences. These new features really highlight our efforts to simplify identity and access management, while we also enhance the kinds ... continue reading
PowerShell Test-NetConnection cmdlet

How to Troubleshoot Windows Server Network connectivity issues via PowerShell

We all have been there, we want to set up a new application or agent which needs network access and needs to reach an endpoint using a specific port, but it simply doesn't work. So as a server admin, we ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading

The psychology of social engineering—the “soft” side of cybercrime

Forty-eight percent of people will exchange their password for a piece of chocolate,[1] 91 percent of cyberattacks begin with a simple phish,[2] and two out of three people have experienced a tech support scam in the past 12 months.[3] What ... continue reading

Best Options for Database Migration into Azure

We often hear that customers need help determining the best option when migrating their on-premises SQL Server to Azure. See the link below to the blog and video we developed to address that question. The video will help you begin ... continue reading

Best Options for Database Migration into Azure

We often hear that customers need help determining the best option when migrating their on-premises SQL Server to Azure. See the link below to the blog and video we developed to address that question. The video will help you begin ... continue reading

Demystifying ARM Templates: Creating Your First Template

Now it's time to code. This session will introduce Visual Studio Code tools and show you how to create your first template from snippet, and how to deploy it. Learn More: Code SamplesAzure Resource Manager (ARM) ToolsDevOps Lab Favorite Links: ... continue reading
How you can contribute to Open Source Projects on GitHub

How you can contribute to Open Source Projects on GitHub

Have you ever wanted to help the community but then started to think: "It won't make a difference anyway", or "everyone knows that already...". In this blog post, I'll explain why your contribution is of great value, and how contributing ... continue reading

Video Tutorial: Client Experience 2 – Application Deployment Part 5

Hello everyone, here is part 5 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by , a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager 2012 in ... continue reading

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

With the dawn of the COVID-19 pandemic, state and federal agencies around the globe were looking at ways to modernize data intake for social services recipients. The government of a country of about 40 million citizens reached out to Microsoft ... continue reading

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

With the dawn of the COVID-19 pandemic, state and federal agencies around the globe were looking at ways to modernize data intake for social services recipients. The government of a country of about 40 million citizens reached out to Microsoft ... continue reading
1.png

Protect and Secure Cloud-based Applications using Azure MFA

Introduction In this article, we're going to talk about enabling MFA for applications that are accessed over the internet. This will force users accessing the application from the internet to authenticate with their primary credentials as well as a secondary ... continue reading

Microsoft is this week’s sponsor of Identiverse Virtual 2020

Welcome to week three of Identiverse Virtual 2020! This year, Identiverse is a series of free virtual sessions that you can attend from the comfort of your home. Microsoft is proud to sponsor this week, June 29-July 3, and join ... continue reading

Unlock your free Azure replica for SQL Server with DH2i

Are you aware that you may be entitled to a free SQL Server license in the cloud for disaster recovery? Recently-announced licensing benefits enable this scenario, and a third-party offering from DH2i can help you set up this configuration to ... continue reading