Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

Digital transformation and the transition to a modern workplace encourage employee engagement, productivity, and collaboration. This transition poses major challenges in protecting sensitive information. In the modern workplace, the perimeter between the corporate network and the cloud are fading. Sensitive ... continue reading
AirMap map screenshot

Dynamic mission planning for drones with Azure Maps

Real-time location intelligence is critical for business operations. From getting real-time road data, to building asset-tracking solutions for navigating drone fleets. Today, we’re excited to highlight a customer, AirMap, whose software solutions rely on Azure Maps for real-time location intelligence ... continue reading
Azure Stack Admin Portal Overview.jpg

Understanding The Azure Stack Operator Toolset

As you might know, Azure Stack is bringing Azure services to your datacenter, or a location closer to you. It is delivered as an integrated system, meaning that it comes predesigned and preinstalled, so customers have a faster go to ... continue reading
Windows Server 2016/2019 Cluster Resource / Resource Types

Windows Server 2016/2019 Cluster Resource / Resource Types

Over the years, we have been asked about what some of the Failover Cluster resources/resource types are and what they do. There are several resources that have been asked about on multiple occasions and we haven’t really had a good ... continue reading
Step 3. Protect your identities: top 10 actions to secure your environment

Step 3. Protect your identities: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 3. Protect your identities, youll learn how to define security policies to protect individual user ... continue reading

Hardening Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 2016 comes reasonably secure “out of the box”. But it’s important to remember that while the server is reasonably secure, not every security control that is can be configured for Windows Server 2016 (and the more recently released ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Hello everyone, I’m Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I’d like to share some insights for securing PowerShell credentials using certificates. This post is based on a recent customer project, but we’ll also wrap ... continue reading
Creating new alert rule in Azure Data Factory

Create alerts to proactively monitor your data factory pipelines

Data integration is complex and helps organizations combine data and business processes in hybrid data environments. The increase in volume, variety, and velocity of data has led to delays in monitoring and reacting to issues. Organizations want to reduce the ... continue reading
Image of a Microsoft Data Box Disk

Azure.Source – Volume 65

Now generally available Announcing the general availability of Azure Data Box Disk Azure Data Box Disk, an SSD-based solution for offline data transfer to Azure, is now generally available in the US, EU, Canada, and Australia, with more country/regions to ... continue reading
Adding to application rule collection screenshot

Azure Backup for virtual machines behind an Azure Firewall

This blog post primarily talks about how Azure Firewall and Azure Backup can be leveraged to provide comprehensive protection to your data. The former protects your network, while the latter backs up your data to the cloud. Azure Firewall, now ... continue reading

Windows Security change affecting PowerShell

The recent (1/8/2019) Windows security patch CVE-2019-0543, has introduced a breaking change for a PowerShell remoting scenario. It is a narrowly scoped scenario that should have low impact for most users. The breaking change only affects local loopback remoting, which ... continue reading
Create New Rule screenshot

Best practices for alerting on metrics with Azure Database for MariaDB monitoring

On December 4, 2018 Microsoft’s Azure Database for open sources announced the general availability of MariaDB. This blog intends to share some guidance and best practices for alerting on the most commonly monitored metrics for MariaDB. Whether you are a ... continue reading

New year, newly available IoT Hub Device Provisioning Service features

We’re ringing in 2019 by announcing the general availability for the Azure IoT Hub Device Provisioning Service features we first released back in September 2018! The following features are all generally available to you today: Symmetric key attestation support Re-provisioning ... continue reading
Predictive analysis made easy

Implement predictive analytics for manufacturing with Symphony Industrial AI

Technology allows manufacturers to generate more data than traditional systems and users can digest. Predictive analytics, enabled by big data and cloud technologies, can take advantage of this data and provide new and unique insights into the health of manufacturing ... continue reading
Achieving compliant data residency and security with azure

Questions on data residency and compliance in Microsoft Azure? We got answers!

Questions about the security of and control over customer data, and where it resides, are on the minds of cloud customers today. We’re hearing you, and in response, we published a whitepaper that gives clear answers and guidance into the ... continue reading
New features on Azure Database for PostgreSQL

Performance troubleshooting using new Azure Database for PostgreSQL features

At Ignite 2018, Microsoft’s Azure Database for PostgreSQL announced the preview of Query Store (QS), Query Performance Insight (QPI), and Performance Recommendations (PR) to help ease performance troubleshooting, in response to customer feedback. This blog intends to inspire ideas on ... continue reading

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Nations from every corner of the world are increasingly leveraging digital transformation to grow their economies and empower businesses to improve services, including vital services provided by critical infrastructures. This adoption of new information communications technologies (ICT) has unfortunately been ... continue reading
How to automate machine learning on SQL Server 2019 big data clusters

How to automate machine learning on SQL Server 2019 big data clusters

In this post, we will explore how to use automated machine learning (AutoML) to create new machine learning models over your data in SQL Server 2019 big data clusters. SQL Server 2019 big data clusters make it possible to use ... continue reading
Windows_Server_2019_OpenSSH.jpg

Installing and Configuring OpenSSH on Windows Server 2019

While I’ve never had a problem with PowerShell remoting for remote command line interaction with Windows Server, I’ve often found that it isn’t something that many systems administrators, especially those that work in heterogeneous environments, are entirely at ease with ... continue reading
Windows Admin Center 1809.5 GA Update and Lenovo XClarity extension are publicly available

Windows Admin Center 1809.5 GA Update and Lenovo XClarity extension are publicly available

Windows Admin Center version 1809.5, which was released to Windows Insiders last December, is now publicly available as a GA (Generally Available) update. Version 1809.5 is a cumulative update to our 1809 GA release from last September which includes various ... continue reading
Be careful of data without context: The case of malware scanning of journaled emails

Be careful of data without context: The case of malware scanning of journaled emails

Recently, we shared details on how effectiveness is measured for Office 365 Exchange Online Protection (EOP) and Advanced Threat Protection (ATP). We also followed up with a comprehensive update on Office 365s improved ability to stop phishing emails from impacting ... continue reading

Four ways to take your apps further with cloud, data, and AI solutions from Microsoft

Companies today demand the latest innovations for every solution they deliver. How can you make sure your infrastructure and data estate keep up with the demands of your business? Read the tips below, and join our upcoming webinar on transforming ... continue reading
PowerShell_Basics.jpg

PowerShell Basics: Detecting if a String Ends with a Certain Character

Did you know you can detect if a string ends in a specific character or if it starts in one in PowerShell? Thomas Rayner previously shared on CANITPRO.NET how this can be easily done by using regular expressions or more ... continue reading
DataKeeper and MaxDB

How to Cluster MaxDB on Windows in the Cloud #Azure #AWS #GCP #SAP

Recently I have had a number of customers looking for a high availability solution for MaxDB on Windows in the cloud. Some customers have been in Azure and some in AWS. But regardless of the cloud platform, they all eventually ... continue reading
#Microsoft #AzureDevOps – Azure Pipelines, #Azure Boards + GitHub with @AbelSquidHead #LoECDA

#Microsoft #AzureDevOps – Azure Pipelines, #Azure Boards + GitHub with @AbelSquidHead #LoECDA

Azure DevOps for CI/CD Azure DevOps Services is a cloud service for collaborating on code development. It provides an integrated set of features that you access through your web browser or IDE client. The features are included, as follows: Git ... continue reading
Windows_Server_2003_Certificate_Migration_001.png

Step-By-Step: Migrating The Active Directory Certificate Service From Windows Server 2003 to 2012 R2

Support for both Windows Server 2003 and 2003 R2 ended on July 14th 2015 and yet there are still a number of organizations operating their businesses on it. With this in mind, there are still a great number of IT ... continue reading

SCCM on Windows Server 2016: The Defender Gotcha

Hello! My name is Todd Linke, and I am a Premier Field Engineer at Microsoft where I specialize in System Center Configuration Manager. I was working with some customers who were seeing strange behavior on their SCCM Site Servers. In ... continue reading
View Container Live logs with #Azure Monitoring #AKS #Kubernetes #Containers #AzureDevOps

View Container Live logs with #Azure Monitoring #AKS #Kubernetes #Containers #AzureDevOps

Monitoring Azure Kubernetes Cluster Azure Monitor for containers is a feature designed to monitor the performance of container workloads deployed to either Azure Container Instances or managed Kubernetes clusters hosted on Azure Kubernetes Service (AKS). Monitoring your containers is critical, ... continue reading
System Center Virtual Machine Manager fails to enumerate and manage Logical switch deployed on the host

System Center Virtual Machine Manager fails to enumerate and manage Logical switch deployed on the host

When Windows update ‘KB4467684‘, ‘KB4478877‘, ‘KB4471321‘ or ‘KB4483229’ is installed on a VMM managed Windows Server 2016 host, VMM is not able to enumerate or manage the Logical Switch deployed on the host. Customers will notice the following symptoms when ... continue reading

The challenges of adopting a consistent cybersecurity framework in the insurance industry

As hacking events have increased in number and severity, we in the cybersecurity community have united around common strategies that all organizations can implement to reduce their risk. Universal best practices provide organizations with many useful tools to protect their ... continue reading
Loading...