Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

PowerShell Constrained Language Mode

PowerShell Constrained Language is a language mode of PowerShell designed to support day-to-day administrative tasks, yet restrict access to sensitive language elements that can be used to invoke arbitrary Windows APIs. You can place a PowerShell session into Constrained Language ... continue reading
In-Memory OLTP Indexes – Part 1: Recommendations.

In-Memory OLTP Indexes – Part 1: Recommendations.

In-Memory OLTP technology, available in Azure SQL Database and SQL Server, can significantly help you in improving the performance of applications that require high throughput and low latency online transaction processing, high volume concurrent data ingestion (Internet of Things – ... continue reading

How to create a VM template for PAW

Continuing with the PAW series, after you followed the previous blog to build the PAW device, you can now deploy PAW VMs on it. There are two types of VMs you can create: Desktop VM: this is a standard VM, ... continue reading
Sentiment analysis with Python in SQL Server Machine Learning Services

Sentiment analysis with Python in SQL Server Machine Learning Services

One very popular machine learning scenario is text analysis. In this blog post, we will show you two different ways in which you can implement sentiment analysis in SQL Server using Python and Machine Learning Services. This means analyzing text ... continue reading
Protecting Domain Administrative Credentials

Protecting Domain Administrative Credentials

Hello, Paul Bergson back again with today’s topic of preventing your Domain Administrators and other privileged identities from logging into Tier 1 and Tier 2 devices. Credential theft protection is always an important step in protecting the enterprise. While your ... continue reading
image

Getting Started with #Azure Data Science Virtual Machine on Windows 2016 #DSVM #winserv #VSTS #DevOps

The Data Science Virtual Machine (DSVM) is a ‘Windows Server 2016 with Containers’ VM & includes popular tools for data exploration, analysis, modeling & development. Highlights: Microsoft R Server – Dev. Ed. (Scalable R) Anaconda Python SQL Server 2017 Dev ... continue reading
Managing Processes with Project "Honolulu"

Managing Processes with Project “Honolulu”

In this video you will learn how to use Project "Honolulu" to manage processes on local or remote servers ... continue reading
Managing Services with Project "Honolulu"

Managing Services with Project “Honolulu”

In this video you will learn how to manage Windows Services on local or remote services with Project "Honolulu" ... continue reading
Server Overview with Project "Honolulu"

Server Overview with Project “Honolulu”

In this video you will learn more about the Server Overview module and how to check the overall status of a managed server ... continue reading
Diagram of methods

Reverse Desired State Configuration: How it works

Nik Charlebois is a Premier Field Engineer based out of Canada. He is the author of several books on SharePoint automation, and he writes blog posts on a regular basis about all things PowerShell. You can find out more about ... continue reading
Windows Server 2016 Essentials with Azure virtual network integration overview

Windows Server 2016 Essentials with Azure virtual network integration overview

Integrate your Windows Server Essentials on-premise applications and networks in the cloud with a virtual network in Azure. In this first of two videos, we will provide an overview of the benefits and how this works. In the second video, ... continue reading
Automatic Dependency Mapping with Service Map and Live Maps

Automatic Dependency Mapping with Service Map and Live Maps

The following is a special guest blog from Savision Modern enterprise IT infrastructures are becoming increasingly difficult to manage as the deployment of new services and applications continues to grow. Applications tend to rely on many other services and applications ... continue reading

System Center 2016 now supports TLS1.2 security protocols

TLS 1.2 is the secure way of communication suggested by Microsoft with best-in class encryption. SSL and early TLS are not considered strong cryptography and cannot be used as a security control. Microsoft has added official support for TLS1.2 security ... continue reading
New Storage Management, Optimization, and Security Features in DPM 2016 UR4

New Storage Management, Optimization, and Security Features in DPM 2016 UR4

System Center 2016 Data Protection Manager can backup key workloads such as SQL, SharePoint, Exchange, file servers, clients and VMs running on Hyper-V or VMware. With Modern Backup Storage and RCT based Hyper-V VM backups, DPM 2016 goes a step ... continue reading

SC 2016 DPM UR4: Migrate Backup Storage in 3 simple steps

SC 2016 Data Protection Manager (SC DPM) is an enterprise backup solution, which gives you the ability to backup workloads as SQL, SharePoint, Exchange, System State, Files and Folders, Hyper-V & VMWare VMs, and Clients. These backups can be stored ... continue reading

Creating a maintenance schedule with more than 216 objects might cause Operations Console to disconnect

When creating a maintenance schedule, selecting more than 216 target objects (these can be any specific entity instances or groups) might result in the Operations Console to disconnect with the following error:“The client has been disconnected from the server. Please ... continue reading
Configuring a Hyper-V Host with PowerShell DSC (Part 1)

Configuring a Hyper-V Host with PowerShell DSC (Part 1)

Hello, my name is Michael Godfrey and I am a Platform’s Premier Field Engineer (PFE) at Microsoft. I have been a Fabric Administrator for the past few years and have made it a habit of building quite a few Hyper-V ... continue reading

Defending Against PowerShell Attacks

The security industry is ablaze with news about how PowerShell is being used by both commodity malware and attackers alike. Surely there’s got to be a way to defend yourself against these attacks! There absolutely is. PowerShell is – by ... continue reading
Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard is a new set of intrusion prevention capabilities that ships with the Windows 10 Fall Creators Update. The four components of Windows Defender Exploit Guard are designed to lock down the device against a wide variety ... continue reading
Making Microsoft Edge the most secure browser with Windows Defender Application Guard

Making Microsoft Edge the most secure browser with Windows Defender Application Guard

Innovation in the attack space is constant as adversaries increase in both determination and sophistication. In response to increased investments in defense, attackers are adapting and improving tactics at breakneck speed. The good news is that defenders are also innovating ... continue reading
Introducing Windows Defender Application Control

Introducing Windows Defender Application Control

Application control is a crucial line of defense for protecting enterprises given today’s threat landscape, and it has an inherent advantage over traditional antivirus solutions. Specifically, application control flips the model from one where all applications are assumed trustworthy by ... continue reading
Hardening the system and maintaining integrity with Windows Defender System Guard

Hardening the system and maintaining integrity with Windows Defender System Guard

One of the things we spend a great deal of time thinking about here at Microsoft is how attackers will attempt to persist and evade detection once they’ve successfully compromised a device. With Windows 10 we’ve made it more difficult ... continue reading

Move away from passwords, deploy Windows Hello. Today!

Something we understood from the very beginning with Windows Hello for Business is our customers would approach Windows 10 in a series of phases. The first phase is to simply deploy the platform itself. From there, additional phases would follow ... continue reading
Stopping ransomware where it counts: Protecting your data with Controlled folder access

Stopping ransomware where it counts: Protecting your data with Controlled folder access

Windows Defender Exploit Guard is a new set of host intrusion prevention capabilities included with Windows 10 Fall Creators Update. One of its features, Controlled folder access, stops ransomware in its tracks by preventing unauthorized access to your important files ... continue reading
Windows Server 2016 Essentials Cloud Enablement Overview

Windows Server 2016 Essentials Cloud Enablement Overview

Watch this video to find out about Windows Server 2016 Essentials features and cloud enablement features available in the product ... continue reading

How to manage Office 365 with System Center Configuration Manager

System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and ... continue reading
Browser security beyond sandboxing

Browser security beyond sandboxing

Security is now a strong differentiator in picking the right browser. We all use browsers for day-to-day activities like staying in touch with loved ones, but also for editing sensitive private and corporate documents, and even managing our financial assets ... continue reading
PAW host buildout

PAW host buildout

Continuing with the PAW series, in this blog post, I'd like to share the details of what we are planning to configure the host. I'd love to hear your thoughts, feedback about the design. For a recap on the PAW ... continue reading
Configure Azure Storage for SQL Database backups

Configure Azure Storage for SQL Database backups

SQL Server 2012+ and Azure SQL Managed Instance support native BACKUP commands that can backup a database to Azure Blob Storage URL. Setting-up Azure Storage account might not be so easy as you think because there are some constraints. You ... continue reading
Diagram of schedule for updates

Azure Log Analytics workspace upgrades in progress

Many of you are currently using Azure Log Analytics to monitor your environments for availability and performance. We want to let you know that we're rolling out new enhancements and changes for Log Analytics, including a new query language. To ... continue reading