Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Screenshot of CommonSecurityLog

Analyze your Check Point logs with OMS Security

The Security & Compliance solution in the Operations Management Suite (OMS) provides security insights about many sources of security data from Windows and Linux machines, including any source that emits Syslog. Today, we are announcing a new capability, developed by ... continue reading
You can also do this with PowerShell

Learning to Use Vagrant: Tips and Tricks with Vagrant and Hyper-V

A few months ago, I went to DockerCon as a Microsoft representative. While I was there, I had the chance to ask developers about their favorite tools. The most common tool mentioned (outside of Docker itself) was Vagrant. This was ... continue reading
Monitoring Large DPM Deployments with SCOM

Monitoring Large DPM Deployments with SCOM

DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. One way to monitor the DPM servers centrally is using SCOM. In this blog, our guest, John Joyner, talks about leveraging Central Console ... continue reading

Microsoft JDBC Driver 6.2 for SQL Server released

This post was authored by Andrea Lam, Program Manager, SQL Server We are happy to announce the full release of the Microsoft JDBC Driver 6.2 for SQL Server. The JDBC Driver provides Java database connectivity from any Java application, application ... continue reading

Webcast: Intro to Microsoft SQL Server on Linux with containers

With our community technology previews of SQL Server 2017, Microsoft is bringing the industry-leading performance and security of SQL Server to Linux and containers for the first time. SQL Server running on Red Hat Enterprise Linux and Red Hat OpenShift ... continue reading

Troubleshooting Service Manager work item (Incident, Change Request, Service Request) status stuck on “New”

Any time we see newly created work items stuck with a “New” status, it generally means that the Service Manager workflows are not processing or are processing slowly. Monitoring the “Minutes behind” of each workflow can be a useful method ... continue reading
CrossBlogPost Microsoft #AzureStack TP3 in the Classroom for Students #Education #DellEMC

CrossBlogPost Microsoft #AzureStack TP3 in the Classroom for Students #Education #DellEMC

Microsoft Azure Stack in the Classroom for Students Today Microsoft Azure Cloud technology is really going fast with Great innovations for people and their businesses to evolve in what they can do best in a real world. To Learn these ... continue reading
image

ConfigMgr 1702: DRS Activation SPROCS Internals (with Case Study)

Hi Folks, To start with explaining this topic a small background on what is Activation. This is purely a SQL Service broker term. The messages when they are placed in the queue need to be processed, so as a message ... continue reading
Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also ... continue reading
Graphic showing DC/OS and OMS container solution

Docker Swarm and Secret support with OMS Insight and Analytics – container monitoring solution

Hello all, this is Keiko, Program Manager from the OMS team. The container monitoring solution, available as part of OMS Insight and Analytics, helps you get visibility into the inventory of containers in hosts, including images running in them and ... continue reading
Figure 1. Infection cycle overview

Exploring the crypt: Analysis of the WannaCrypt ransomware SMB exploit propagation

On May 12, there was a major outbreak of WannaCrypt ransomware. WannaCrypt directly borrowed exploit code from the ETERNALBLUE exploit and the DoublePulsar backdoor module leaked in April by a group calling itself Shadow Brokers. Using ETERNALBLUE, WannaCrypt propagated as ... continue reading
Windows 10 platform resilience against the Petya ransomware attack

Windows 10 platform resilience against the Petya ransomware attack

The Petya ransomware attack on June 27, 2017 (which we analyzed in-depth in this blog) may have been perceived as an outbreak worse than last month's WannaCrypt (also known as WannaCry) attack. After all, it uses the same SMB exploit ... continue reading
clip_image002

ConfigMgr CB: 'Delete Aged Discovery Data' Internals (with Case Study)

Hi Folks, Many a times we do get cases where the Delete Aged Discovery Data is not deleting the records that we expect it to delete. So here are some findings that are not documented and I have had quite ... continue reading
clip_image002

ConfigMgr CB: ‘Delete Aged Discovery Data’ Internals (with Case Study)

Hi Folks, Many a times we do get cases where the Delete Aged Discovery Data is not deleting the records that we expect it to delete. So here are some findings that are not documented and I have had quite ... continue reading
New ransomware, old techniques: Petya adds worm capabilities

New ransomware, old techniques: Petya adds worm capabilities

(Note: We have published a follow-up blog entry on this ransomware attack. We have new findings from our continued investigation, as well as platform mitigation and protection information: Windows 10 platform resilience against the Petya ransomware attack.) On June 27, ... continue reading
What’s new in Windows Defender ATP Fall Creators Update

What’s new in Windows Defender ATP Fall Creators Update

When we introduced Windows Defender Advanced Threat Protection (Windows Defender ATP), our initial focus was to reduce the time it takes companies to detect, investigate, and respond to advanced attacks. The Windows Fall Creators Update represents a new chapter in ... continue reading
Extending OMS with SCCM Information

Extending OMS with SCCM Information

Brad Watts here to talk with you today about extending OMS with SCCM information. Microsoft Operations Management Suite (OMS) is a very powerful cloud based tool. There are bunch of out of the box solutions like Alert Management, Active Directory ... continue reading
Running Open Source Workloads with Windows Server 2016

Embracing Open Source Workloads with Windows Server 2016

You may be surprised to learn that Microsoft has embraced open source in Windows Server 2016 and across applications and development tools. Watch this video learn how you can work with Linux and other Open Source platforms and applications with ... continue reading
Screenshot of security subscription notification

Partnering with the AV ecosystem to protect our Windows 10 customers

On Friday May 12th, and for several days afterwards, more than a quarter-million computers around the world fell victim to the ransomware known as WannaCrypt or WannaCry. As that recent event has shown, malicious actors bring nearly boundless time and ... continue reading

TLS 1.2 support at Microsoft

This post is authored by Andrew Marshall, Principal Security Program Manager, Trustworthy Computing Security. In support of our commitment to use best-in-class encryption, Microsoft’s engineering teams are continually upgrading our cryptographic infrastructure. A current area of focus for us is ... continue reading

Predictions for 2017 and Beyond: A look into what’s driving the future of technology with Microsoft CTO of Services, Norm Judah

Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review ... continue reading
Using Computer Name Aliases in place of DNS CNAME Records

Using Computer Name Aliases in place of DNS CNAME Records

Hi everyone. Graeme Bray here with an article around using Computer Name Aliases instead of DNS CName records. In the past, we used to set the registry key DisableStrictNameChecking to be able to add a DNS alias to connect via ... continue reading
Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security

Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security

On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by releasing a set of weaponized exploits. Shortly thereafter, one of these exploits was used to create wormable malware that we now know ... continue reading
Single map of all the servers in your service

Service Map Machine Groups

With the general availability of Service Map, you were able to automatically discover and build a common reference map of dependencies across servers, processes, and services from partners in real-time. It helped you expedite pinpointing issues by visualizing dependencies of ... continue reading
Dropping the “Untrusted Font Blocking” setting

Dropping the “Untrusted Font Blocking” setting

With the Windows 10 v1703 security configuration baseline, Microsoft is removing the recommendation to enable the “Untrusted Font Blocking” Group Policy setting in Computer Configuration | Administrative Templates | System | Mitigation Options. Windows 10 includes additional mitigations that make ... continue reading
Migrating Datacenter to Azure - Part 2

Migrating Datacenter to Azure – Part 2

This post provides an overview of key technical considerations, actionable recommendations and common pitfalls related to migration of workloads from an on-premises datacenter to Microsoft Azure. The business related considerations were addressed within the Migrating Datacenter to Azure – Part ... continue reading
Migration Datacenter to Azure – Part 2

Migration Datacenter to Azure – Part 2

This post provides an overview of key technical considerations, actionable recommendations and common pitfalls related to migration of workloads from an on-premises datacenter to Microsoft Azure. The business related considerations were addressed within the Migrating Datacenter to Azure – Part 1 ... continue reading

Deploy Windows from USB drive to Surface Studio

Hi, my name is Scott McArthur and I am Supportability Program Manager in Surface. Today I am going discuss two scenarios involving deploying Windows 10 to Surface Studio. Today if you don’t follow the steps outlined below you will see ... continue reading
Deploy Surface Studio using MDT

Deploy Surface Studio using MDT

Hi, my name is Scott McArthur and I am Supportability Program Manager in Surface. Today I am going to walk through deploying Windows 10 Enterprise Version 1703(Creators Update) to a Surface Studio using Microsoft Deployment Toolkit 8443. Microsoft Deployment Toolkit ... continue reading
“Helping ARM” – Azure Resource Manager step-by-step training

“Helping ARM” – Azure Resource Manager step-by-step training

Talking to service providers in CEE it seems that Azure Resource Manager - ARM - the JSON based template language is something everybody interested. Why? There are several reasons for that. ARM is the bridge between awaited Azure Stack and ... continue reading