Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Percentage chart showing 98 percent of cyberattacks are prevented by basic security hygiene and 50 percent of small businesses use personal devices to access work data.

Microsoft continues to innovate to help secure small businesses

Small and medium-sized businesses are at the heart of our economy and are dedicated to driving value for their customers, whether that means trying new recipes, exploring new inventory, expanding services, arranging the shop so it’s easier to navigate, or ... continue reading
Azure VMware Solution - Monitoring Quickstart Guide

Azure VMware Solution – Monitoring Quickstart Guide

Learn how easy it is to quickly set up some basic alerting and monitoring in your Azure VMware Solution environment.   In this video, I utilize the GitHub repository provided by Microsoft AVS experts available at Enterprise Scale for AVS Follow along ... continue reading
Chart demonstrating the segments of Microsoft's cloud-native application protection platform, including cloud security posture management, cloud workload protection, DevSecOps, and cloud infrastructure entitlement management.

The next wave of multicloud security with Microsoft Defender for Cloud, a Cloud-Native Application Protection Platform (CNAPP)

With digital transformation in the face of macroeconomic pressures, strategies to optimize both cloud environments and cloud security are increasingly appealing to enterprises. Organizations worry about vulnerabilities in code getting deployed, critical misconfigurations, overprivileged access to cloud infrastructure, and evolving ... continue reading
™

Microsoft recognized as a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Organizations need to protect their sensitive data including intellectual property, trade secrets, customer data, and personally identifiable information from both insiders and external cyber attackers. In fact, 80 percent of organizations experience more than one data breach in their lifetime.1 ... continue reading
Diagram showing the order of evaluation for network traffic with security admin rules and network security group rules.

Connect, secure, and simplify your network resources with Azure Virtual Network Manager

Enterprise-scale management and configuration of your network resources in Azure are key to keeping costs down, reducing operational overhead, and properly connecting and securing your network presence in the cloud. We are happy to announce Azure Virtual Network Manager (AVNM), your ... continue reading
msfoxworks_1-1679040500807.png

Change Configuration Manager Site Server OS – In-place Upgrade Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading

Gain real-time identity protection with Microsoft and Recorded Future

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  You’ve implemented multifactor authentication for access to your enterprise network. But what if multifactor authentication isn’t as foolproof as you’re hoping? Are you comfortable ... continue reading
Customize your authentication flows with custom claims providers!

Customize your authentication flows with custom claims providers!

Howdy folks,  I’m super excited to announce the public preview of custom claims providers for Azure Active Directory (Azure AD), now part of Microsoft Entra.   A custom claims provider lets you call an API and map custom claims into ... continue reading
EDM Council CDMC Cloud Certified certification badge.

Microsoft achieves first native Cloud Data Management Capabilities certification

Today, Microsoft announced the successful completion of the Cloud Data Management Capabilities (CDMC) 14 Key Controls and Automations certification, conducted by Accenture and Avanade, accelerating the industry’s move to the cloud. The 14 Key Controls and Automations are a part ... continue reading
Screenshot of Microsoft Defender for IoT’s graphical user interface displaying the inventory of devices in the environment.

Leverage cloud-powered security with Microsoft Defender for IoT

Traditionally, operational technology (OT) and IT have occupied separate sides of enterprise security. But with digital transformation and the advent of Industry 4.0, the old, siloed approach is showing its age.1 The rise of manufacturing execution systems has enabled more ... continue reading
varghesejoji_0-1678166895992.png

Decision Flow to Estimate Pod Spread on AKS

In Azure Kubernetes Service (AKS), the concept of pod spread is important to ensure that pods are distributed efficiently across nodes in a cluster. This helps to optimize resource utilization, increase application performance, and maintain high availability.   This article ... continue reading
Line chart showing trend of number of daily DDoS attacks targeting healthcare

KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks

In the last year, geopolitical tension has led to an uptick of reported cybercrime events fueled by hacktivist groups. The US Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn organizations about these attacks and teamed with the ... continue reading

Don’t miss us at Microsoft Secure & Gartner IAM

Event season is approaching! Our team is looking forward to seeing you all at Gartner IAM and Microsoft Secure this month! Check out our identity sessions below: Gartner IAM Microsoft will be participating in Gartner IAM March 20-22 in Grapevine, ... continue reading
:smile:

Change Configuration Manager Site Server OS – Disaster Recovery Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading
SDN + AKS 3-15-23 Updates and Features

SDN + AKS 3-15-23 Updates and Features

Hello to our amazing Customers- Can you believe it's almost April, better yet, almost Spring!? Time is flying and our SDN team is hard at work in coordination with the AKS Hybrid team.  The 3-15-23 AKS Hybrid release includes a ... continue reading

Join us at Microsoft Secure to discover the latest security solutions

Microsoft Secure is our first flagship event designed just for security professionals. On March 28, 2023, we will bring together security professionals from around the world to explore security information and event management (SIEM) and extended detection and response (XDR), ... continue reading
Wired for Hybrid - Deep Dive 1 - Azure AD introduces support for IPV6

Wired for Hybrid – Deep Dive 1 – Azure AD introduces support for IPV6

Hello Folks, Microsoft introduced support for IPv6 in our operating systems starting with Windows XP Service Pack 1 in 2002. However, it wasn't until Windows Vista in 2006 that Microsoft offered full support for IPv6. In 2011, the Internet Assigned ... continue reading

How To Upgrade/Change the Operating System Which Hosts Microsoft Configuration Manager

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field and ... continue reading
Physical switch requirement changes for Azure Stack HCI

Physical switch requirement changes for Azure Stack HCI

Hello everyone, I’m Basel Kablawi, PM on the Azure Edge and Platform - Core Networking team, here to announce the latest updates to the physical network switch requirements!  Our ecosystem of physical switches is designed to help ensure the compatibility and ... continue reading

Gain flexibility and scale with a cloud-native DLP solution

We’re living in a seismic era for data security. Chief information security officers (CISOs) have to contend with a digital landscape that seems to shift daily as more organizations move to remote and hybrid work, redrawing the boundaries for how ... continue reading
Azure firewall Basic serves as the hub and connects to spoke 1 and spoke 2. It includes the L3-L7 connectivity policies, Microsoft threat intelligence feature, NAT, network and application traffic filtering that allows outbound and inbound connections. Without a rule, the traffic is denied by default.

Protect against cyberattacks with the new Azure Firewall Basic

Cyberattacks continue to rise across businesses of all sizes as attackers are adapting their techniques and increasing the complexity of their operations.1 The risk of these attacks is significant for small and medium businesses (SMBs) as they usually don’t have ... continue reading
Photograph of modern data center interior with overlay of digital streams for visual interest.

Microsoft to showcase purpose-built AI infrastructure at NVIDIA GTC

Join Microsoft at NVIDIA GTC, a free online global technology conference (GTC), March 20 to 23 to learn how organizations of any size can power AI innovation with purpose-built cloud infrastructure from Microsoft. Microsoft's Azure AI supercomputing infrastructure is uniquely designed ... continue reading
fbinotto_0-1678779519222.png

Automating Block Blob Backup

Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia.   This post is about how you can automate the backup of Block Blob Storage using Azure Backup Vault (not to be confused with Azure Recovery Service ... continue reading
DEV-1101 AiTM tool announcement noting a license as $100 along with contact information and links.

DEV-1101 enables high-volume AiTM campaigns with open-source phishing kit

Adversary-in-the-middle (AiTM) phishing kits are part of an increasing trend that is observed supplanting many other less advanced forms of phishing. AiTM phishing is capable of circumventing multifactor authentication (MFA) through reverse-proxy functionality. DEV-1101 is an actor tracked by Microsoft ... continue reading

Field tips for AKS storage provisioning

In an Azure Kubernetes (AKS) cluster, Pods can access physical storage resources such as disks or volumes using Persistent Volumes (PV). To use these resources, Pods need to make a Persistent Volume Claim (PVC), which requests a specific amount of ... continue reading
Portrait of man with a tie and plaid button down shirt sitting on a couch facing the camera, smiling with his hands folded.

SQL Server 2022: Intel® QuickAssist Technology overview

Part of the SQL Server 2022 blog series. In SQL Server 2008 Enterprise Edition, backup compression was introduced addingWITH COMPRESSION as an option in the T-SQL backup command. SQL Server backup compression provides the compressed backup option for all streaming SQL ... continue reading
Portrait of man with a tie and plaid button down shirt sitting on a couch facing the camera, smiling with his hands folded.

SQL Server 2022: Intel® QuickAssist Technology overview

Part of the SQL Server 2022 blog series. In SQL Server 2008 Enterprise Edition, backup compression was introduced addingWITH COMPRESSION as an option in the T-SQL backup command. SQL Server backup compression provides the compressed backup option for all streaming SQL ... continue reading
R.png

The beginning of the end of Remote Mailslots

Heya folks, Ned here again. With the release of Windows 11 Insider Preview Build 25314, we have started disabling the Remote Mailslot protocol by default. This is a precursor to deprecation and eventual removal from Windows. You aren't using this extremely legacy ... continue reading
R.png

The beginning of the end of Remote Mailslots

Heya folks, Ned here again. With the release of Windows 11 Insider Preview Build 25314, we have started disabling the Remote Mailslot protocol by default. This is a precursor to deprecation and eventual removal from Windows. You aren't using this extremely legacy ... continue reading

International Women’s Day: The power of diversity to build stronger cybersecurity teams

Women’s History Month is a special time for me as I reflect on all the great innovations women have made over the years. Women have driven technology forward throughout history. Notable women in cybersecurity like cryptologists Agnes Meyer Driscoll and ... continue reading