Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

windows-containers

Running #NanoServer in a #Container on Windows Server 2016 with #Docker in Powershell #DevOps

What are Containers They are an isolated, resource controlled, and portable operating environment.  Basically, a container is an isolated place where an application can run without affecting the rest of the system and without the system affecting the application. Containers ... continue reading
docker-site-1

#Docker containers running on #Windows10 for #DevOps #Azure

An integrated, easy-to-deploy environment for building, assembling, and shipping applications from a Windows PC, Docker for Windows is a native Windows application with a native user interface and auto-update capability, deeply integrated with Windows native virtualization, Hyper-V, networking and file ... continue reading

Troubleshooting ‘Unsupported Cluster Configuration’ errors in Virtual Machine Manager 2012 R2

~ John Clyburn | Senior Consultant Hi everyone, my name is John Clyburn and I’m a senior consultant here at Microsoft. I was recently working at a customer site where we were getting “Unsupported Cluster Configuration” errors in the SCVMM ... continue reading
thCA1QREO3

Windows Server 2016: (Part 1) Getting Started with Shielded VMs

One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new ... continue reading
ORCA_Banner

What’s New in Windows Server 2016 Networking

The Azure inspired software defined networking stack that is built into Windows Server 2016 reduces the complexity and cost of network infrastructure. Not only that, you can now define your network infrastructure so that it is portable to your application ... continue reading
shamoon-depriz-implants

Windows 10: protection, detection, and response against recent Depriz malware attacks

A few weeks ago, multiple organizations in the Middle East fell victim to targeted and destructive attacks that wiped data from computers, and in many cases rendering them unstable and unbootable. Destructive attacks like these have been observed repeatedly over ... continue reading
azure-cloud-witness

Understanding the Windows Server Failover Cluster Quorum in Windows Server 2016

Before we look at the new quorum features in Windows Server 2016, I think it is important to know where we came from. In my previous post Understanding the Windows Server Failover Cluster Quorum in Windows Server 2012 R2 I ... continue reading
ORCA_Banner

Hybrid, Private and Public Clouds on Windows Server 2016

In this episode we'll examine the range of features, connectivity types as well as integration points with Azure that Windows Server 2016 brings to bear. Giving customers a broad range of cloud options that make it extremely fast and easy ... continue reading
oms-servicemap-overview

Get Started with Microsoft #MSOMS Service Map to get in Control #HybridCloud #Winserv #Linux

Microsoft OMS Service Map Service Map automatically discovers application components on Windows and Linux systems and maps the communication between services. It allows you to view your servers as you think of them – as interconnected systems that deliver critical ... continue reading
ORCA_Banner

Windows Server 2016 Productivity and IT Efficiency

This video provides a great overview on how Windows Server 2016 helps IT admins, end users and businesses drive efficiency and productivity gains through using the new operating system. In this video you will get an in depth view into ... continue reading
oms-agents

Hybrid IT Connect computers and devices to #MSOMS using the OMS Gateway #Winserv #Linux

Instead of each individual agent sending data directly to OMS and requiring a direct Internet connection, all agent data is instead sent through a single computer that has an Internet connection. That computer is where you install and use the ... continue reading
Email message masquerading as a fax but carrying TrojanDownloader:JS/Crimace.A as attachment

Fake fax ushers in revival of a ransomware family

"Criminal case against you" is a message that may understandably cause panic. That’s what a recent spam campaign hopes happens, increasing the likelihood of recipients opening the malicious attachment. We recently discovered a new threat that uses email messages pretending ... continue reading

Artificial intelligence and cybersecurity: The future is here

Although we’re a very long way from putting artificial intelligence (AI) in charge of national defense, the use of AI in cybersecurity isn’t science fiction. The ability of machines to rapidly analyze and respond to the unprecedented quantities of data ... continue reading

No payment necessary: Fighting back against ransomware

Any IT professional who’s ever had an experience with malware knows how fast an intrusive attack can happen, and how difficult it can be to educate employees to be vigilant against such threats. And with ransomware attacks only growing, having ... continue reading

Adobe Flash support on Windows Server 2016

With the changes that have occurred to further align the Windows Server and Client desktop experiences, one of the most commonly asked questions is “Does Windows Server 2016 ship with Adobe Flash?” Answer: Adobe is included and does ship on ... continue reading
Map showing location of observed Soctuseer infections. The United States, Indonesia and India account for 40% of infections

MSRT November 2016: Unwanted software has nowhere to hide in this month’s release

We came across a browser modifier that sports rootkit capabilities. Not only does the threat, detected as BrowserModifier:Win32/Soctuseer, cross the line that separates legitimate software from unwanted, it also takes staying under the radar to the next level. Rootkit capabilities, ... continue reading
Demo: Setup extended network monitoring

Demo: Setup extended network monitoring

In this video tutorial you will see how to setup extended network monitoring in System Center 2016 Operations Manager. Using the new Network Monitoring MP Generator tool you can generate management packs to get extended monitoring for your SNMP-enabled devices ... continue reading
Virtual Machine Load Balancing in Windows Server 2016

Virtual Machine Load Balancing in Windows Server 2016

Join Elden Christensen, Principal PM Manager in the High Availability & Storage team, for an overview and demo of VM (Virtual Machine) Load Balancing, an exciting new feature built right into Windows Server 2016. VM Load Balancing analyzes the compute ... continue reading
thCA1QREO3

How to Simplify Device & Apps Management using Microsoft Intune

Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s ... continue reading
🙂

The case of the unexplained – ConfigMgr 1606: Office365 inventory data doesn’t replicate to CAS.

Hi Folks, I happen to document this enough working on an issue and hence posting this out to revive my unexplained series that was dormant for quite a while. Issue: We introduced this new class in ConfigMgr 1606, I believe ... continue reading
image

Building a Windows Server 2016 Domain Controller #winserv #Hybrid #cloud #Azure #powershell

Building a Domain Controller is not that Difficult but what about building this with Powershell and use the 2016 Bits. Well lets take a peek at the Technet site https://technet.microsoft.com/en-us/library/hh974720(v=wps.630).aspx nothing about 2016. -DomainMode<DomainMode> Specifies the domain functional level of ... continue reading
consistent-management-layer

Learn #JSON with Microsoft #Azure Resource Manager and Visual Studio #Code for #AzureStack #Cloud

The infrastructure for your application is typically made up of many components – maybe a virtual machine, storage account, and virtual network, or a web app, database, database server, and 3rd party services. You do not see these components as ... continue reading
Network Load Balancing and other software components

Windows Server 2016 NLB Network Load Balancing non-SDN or Software Load Balancing (SLB) for SDN #NLB #SLB #SDN

Windows Server 2016 Network Load Balancing. You can use Network Load Balancing to manage two or more servers as a single virtual cluster. Network Load Balancing enhances the availability and scalability of Internet server applications such as those used on ... continue reading
image

Monitoring your home IP security cameras with OMS Log Analytics

Summary: Monitor devices, like home IP security cameras, with OMS Log Analytics without installing an agent! Hi folks, In this blog post I would like to share with you how you can monitor devices with Log Analytics without the need ... continue reading
thCA1QREO3

Getting Started with Windows Containers

Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why ... continue reading
Hicurdismos displays a fake BSoD message that has contact details for fake support. Note: The real messages do not include support contact details, nor when you call for support are you asked for payment.

Beware of Hicurdismos: It’s a fake Microsoft Security Essentials installer that can lead to a support call scam

(Note: Our Tech support scams FAQ page has the latest info on this type of threat, including scammer tactics, fake error messages, and the latest scammer hotlines.) Wouldn’t it be a shame if, in trying to secure your PC, you ... continue reading
The graph shows that Locky machine encounters has recently been low

The new .LNK between spam and Locky infection

Just when it seems the Ransom:Win32/Locky activity has slowed down, our continuous monitoring of the ransomware family reveals a new workaround that the authors might be using to keep it going. The decline in Locky activity can be attributed to ... continue reading
blog post - v1607 - screenshot

Security baseline for Windows 10 v1607 (“Anniversary edition”) and Windows Server 2016

Microsoft is pleased to announce the release of the security configuration baseline settings for Windows 10 version 1607, also known as “Anniversary edition” and internally as “Redstone 1”. The downloadable attachment to this blog post includes importable GPOs, tools for ... continue reading
a1

Introducing the Nano Server Image Builder

Hi there, Scott Johnson here to talk about the new Nano Server Image Builder tool, my new favorite time-saver. The Nano Server Image Builder helps you create a custom Nano Server image and bootable USB media with the aid of ... continue reading
Demo: Deploy Network Controller

Demo: Deploy Network Controller

In this video tutorial you will see how you can use the service template-based mechanism, provided by VMM 2016, for deployment and horizontal scaling of Software Defined Networking components - Network Controller, Gateway, and Software Load Balancer. Network Controller is ... continue reading