Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

How to do Bulk and Transactional Batch operations with the Azure Cosmos DB .NET SDK

Matías Quaranta (@ealsur) shows Donovan Brown (@donovanbrown) how to do bulk operations with the Azure Cosmos DB .NET SDK to maximize throughput, and how to use the new Transactional Batch support to create atomic groups of operations.[0:02:21] - Demo: Batch ... continue reading

How to set up a direct interconnection between Azure and Oracle Cloud Infrastructure (OCI)

Romit Girdhar, Microsoft (@romitgirdhar) and Chinmay Joshi,Oracle join Lara Rubbelke to explain how to interconnect Microsoft Azure and Oracle Cloud Infrastructure. The Microsoft Azure and Oracle Cloud interoperability partnership enables you to migrate and run mission-critical enterprise workloads across both ... continue reading
Image of three coworkers working at a desk in an office.

Changing the monolith—Part 2: Whose support do you need?

In Changing the monolith—Part 1: Building alliances for a secure culture, I explored how security leaders can build alliances and why a commitment to change must be signaled from the top. But whose support should you recruit in the first ... continue reading

New Data Exposed episode: How to connect to Azure SQL Database from Azure Data Studio

Want to get started with Azure Data Studio but don't know where to begin? In this video, Anna Hoffman shows you how to get connected to Azure SQL Database for the first time using Azure Data Studio ... continue reading
Image of Python source code.

Introducing Microsoft Application Inspector

Modern software development practices often involve building applications from hundreds of existing components, whether they’re written by another team in your organization, an external vendor, or someone in the open source community. Reuse has great benefits, including time-to-market, quality, and ... continue reading
Decomposition is the task to separate a time series into components

Azure Data Explorer and Stream Analytics for anomaly detection

Anomaly detection plays a vital role in many industries across the globe, such as fraud detection for the financial industry, health monitoring in hospitals, fault detection and operating environment monitoring in the manufacturing, oil and gas, utility, transportation, aviation, and ... continue reading
A teacher and student looking at a computer together

Creating a more accessible world with Azure AI

At Microsoft, we are inspired by how artificial intelligence is transforming organizations of all sizes, empowering them to reimagine what’s possible. AI has immense potential to unlock solutions to some of society’s most pressing challenges. One challenge is that according ... continue reading

How to implement Multi-Factor Authentication (MFA)

Another day, another data breach. If the regular drumbeat of leaked and phished accounts hasn’t persuaded you to switch to Multi-Factor Authentication (MFA) already, maybe the usual January rush of ‘back to work’ password reset requests is making you reconsider ... continue reading
Windows Server 2008 End of Support - Migrating File Servers

Windows Server 2008 End of Support – Migrating File Servers

With the End of Support for Windows Server 2008 on January 14th, 2020 - you no longer have the ability to receive Security Updates or Support for any servers running Windows Server 2008. If you need to keep these systems ... continue reading

New Azure blueprint for CIS Benchmark

We’ve released our newest Azure blueprint that maps to another key industry-standard, the Center for Internet Security (CIS) Microsoft Azure Foundations Benchmark. This follows the recent announcement of our Azure blueprint for FedRAMP moderate and adds to the growing list ... continue reading
Windows Server 2008 End of Support: How to Get Extended Security Updates

Windows Server 2008 End of Support: How to Get Extended Security Updates

With the End of Support for Windows Server 2008 on January 14th, 2020 - you no longer have the ability to receive Security Updates or Support for any servers running Windows Server 2008. If you need to keep these systems ... continue reading
Image from scenario one: Ransomware

Rethinking cyber scenarios—learning (and training) as you defend

In two recent posts I discussed with Circadence the increasing importance of gamification for cybersecurity learning and how to get started as a practitioner while being supported by an enterprise learning officer or security team lead. In this third and ... continue reading

Configure Ansible to use a Managed Identity with Azure Dynamic Inventory

Hello again, Chris Wallen here and in this post, I’m going to show you how to configure the Ansible Azure Dynamic Inventory plugin to use a managed identity. If you’re not familiar with managed identities, see this overview of managed ... continue reading
Windows Server 2008 End of Support: Know your Options

Windows Server 2008 End of Support: Know your Options

The time has come - we are officially at the End of Support for Windows Server 2008. What does this mean? In simple terms - if you are running any Windows Server 2008 / 2008 R2 servers in your environment ... continue reading

Learning from cryptocurrency mining attack scripts on Linux

Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers. In the past, we've talked about how some attackers use brute force techniques to guess account names and passwords and use those to gain access ... continue reading
JB Hunt truck, linking to video

Turning to a new chapter of Windows Server innovation

Today, January 14, 2020, marks the end of support for Windows Server 2008 and Windows Server 2008 R2. Customers loved these releases, which introduced advancements such as the shift from 32-bit to 64-bit computing and server virtualization. While support for ... continue reading
ingestion-4.2.png

Scaling up an IoT workload using an M-series Azure SQL database

M-series provides close to 30 GB of memory per core and up to 128 cores, enabling significant scale-up capability in Azure SQL Database. For the same IoT workload, we achieved 3 times higher throughput on M-series compared to P15, at ... continue reading

IoT Signals retail report: IoT’s promise for retail will be unlocked addressing security, privacy and compliance

Few industries have been disrupted by emerging technology quite like retail. From exploding online sales to the growth of mobile shopping, the industry has made a permanent shift to accommodate digital consumers. The rise of IoT has forced the retail ... continue reading

Azure is now certified for the ISO/IEC 27701 privacy standard

We are pleased to share that Azure is the first major US cloud provider to achieve certification as a data processor for the new international standard ISO/IEC 27701 Privacy Information Management System (PIMS). The PIMS certification demonstrates that Azure provides ... continue reading
: 6 IoT Central retail application templates designed to accelerate solution development.

Retailers embrace Azure IoT Central

For many retailers around the world, the busiest quarter of the year just finished with holiday shopping through Black Friday and Cyber Monday to Boxing Day. From supply chain optimization, to digital distribution, and in-store analytics, the retail industry has ... continue reading
: 6 IoT Central retail application templates designed to accelerate solution development.

Retailers embrace Azure IoT Central

For many retailers around the world, the busiest quarter of the year just finished with holiday shopping through Black Friday and Cyber Monday to Boxing Day. From supply chain optimization, to digital distribution, and in-store analytics, the retail industry has ... continue reading

Premier Offerings: Onboarding Accelerator – Office 365 Security and Compliance

Houston… We have a Problem… Have you ever noticed there is an awful lot of educational workshops and deliveries that teach you about all these amazing features, but ultimately leave you wondering how to actually implement them in your environment? ... continue reading

How to build and deploy a containerized app to Azure Kubernetes Service (AKS)

Jay Gordon (@jaydestro) joins Donovan Brown (@donovanbrown) to show how to build a containerized React application and deploy it to production with Azure Kubernetes Service. He'll also show how to configure an Azure Active Directory service principal to enable Role-Based ... continue reading

New Data Exposed episode: Deployment options for Azure SQL Database

Azure SQL Database provides a number of options to optimize your deployment to best fit your needs. In this video we explain the different options and their aspects. More information: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-paas-vs-sql-server-iaas ... continue reading

Empower Firstline Workers from Day One with enhanced identity and access management capabilities

Companies at the forefront of digital transformation recognize how critical it is to enable all of their people with the right technology and tools. That’s why in industries like retail, hospitality, and manufacturing, there’s a movement underway to digitally empower ... continue reading
Introducing security defaults

Introducing security defaults

Hey folks, In 2012, we started the Identity security and protection team for our consumer accounts (Microsoft accounts used for signing in to OneDrive, Skype, Xbox and such). We started out by doing two things – putting metrics in place ... continue reading
Changing the monolith—Part 1: Building alliances for a secure culture

Changing the monolith—Part 1: Building alliances for a secure culture

Any modern security expert can tell you that we’re light years away from the old days when firewalls and antivirus were the only mechanisms of protection against cyberattacks. Cybersecurity has been one of the hot topics of boardroom conversation for ... continue reading
Working with Azure Service Principal Accounts

Working with Azure Service Principal Accounts

When I worked with on-prem IT infrastructure I was always keen to automate parts as much as possible, whether that was setting up a scheduled task to stop and start services on temperamental servers or automating the patching of the ... continue reading

Microsoft 365 helps governments adopt a Zero Trust security model

For governments to function, the flow of data on a massive scale is required—including sensitive information about critical infrastructure, citizens, and public safety and security. The security of government information systems is subject to constant attempted attacks and in need ... continue reading
Threat hunting in Azure Advanced Threat Protection (ATP)

Threat hunting in Azure Advanced Threat Protection (ATP)

As members of Microsoft’s Detection and Response Team (DART), we’ve seen a significant increase in adversaries “living off the land” and using compromised account credentials for malicious purposes. From an investigation standpoint, tracking adversaries using this method is quite difficult ... continue reading
Loading...