Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Viewing Memory in PowerShell

Viewing Memory in PowerShell

Hello there, this is Benjamin Morgan, and I’m a Premier Field Engineer covering Active Directory and Platforms related topics. This is my first blog post I hope you are all as excited about this as I am! Today I wanted ... continue reading
ORCA_Banner

(Part 1) Microsoft Operations Management Suite – Windows Server 2016

In this first part in a three part video series we provide an overview of Microsoft's cloud delivered management system Operations Management Suite (OMS). OMS was developed by Microsoft as a comprehensive management suite for managing all of your server ... continue reading

Copying Files into a Hyper-V VM with Vagrant

A couple of weeks ago, I published a blog with tips and tricks for getting started with Vagrant on Hyper-V. My fifth tip was to “Enable Nifty Hyper-V Features,” where I briefly mentioned stuff like differencing disks and virtualization extensions ... continue reading
msftlovesphp

Microsoft Drivers v4.3.0 for PHP for SQL Server released!

This post was authored by Meet Bhagdev, Program Manager, Microsoft Hi all, We are excited to announce the Production Ready release for the Microsoft Drivers v4.3.0 for PHP for SQL Server. The drivers now support Debian Jessie and macOS. The ... continue reading
RDSTWEAKERS.COM

How to: Resize virtual machines in #Azure With #Powershell Multiple or Single virtual machines

With the new VM sizes in Azure you may want to change the Size as you get more VM for less money. but remember the VM will restart! so better fi But changing the VM by hand is a time ... continue reading
Windows Defender Antivirus instant protection from the cloud

Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware

For cybercriminals, speed is the name of the game. It takes newly released malware an average of just four hours to achieve its goal—steal financial information, extort money, or cause widespread damage. In a recent report, the Federal Trade Commission ... continue reading

Monitoring automatic tuning actions using XEvents

SQL Server 2017 can automatically tune your queries by identifying and fixing SQL plan change regressions. SQL Server tracks last known good plans for each query, and if the plan for the query changes, last know good plan will be ... continue reading

ConfigMgr 1702+: Adding a new node (Secondary Replica) to an existing SQL AO AG

Scenario: We already have a working Primary and secondary replica and we know that ConfigMgr 1702 does support an extra replica i.e. 2nd Secondary replica. So we are adding a freshly built node as a secondary replica. The documentation we ... continue reading

ConfigMgr 1702: Adding a new node (Secondary Replica) to an existing SQL AO AG

Scenario We already have a working Primary and secondary replica and we know that ConfigMgr 1702 does support an extra replica i.e. 2nd Secondary replica. So we are adding a freshly built node as a secondary replica. The documentation we have ... continue reading

Connecting Customers with Microsoft Product Teams

The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved ... continue reading

PowerShell 6.0 Roadmap: CoreCLR, Backwards Compatibility, and More!

As we’ve made progress on open-source PowerShell, it’s time to start talking more in-depth about: different editions of PowerShell PowerShell’s relationship to .NET Core and .NET Standard the future of PowerShell when you might expect to start taking a dependency ... continue reading
ORCA_Banner

HPE Speaks Out on Hybrid Cloud and Windows Server 2016

Watch this episode to learn about HPE's point of view on Hybrid Cloud and Windows Server 2016 and industry trends in the datacenter. Get insights for types of cloud vs. on premise scenarios that may make sense for your datacenter ... continue reading

Core Network Stack Features in the Creators Update for Windows 10

By: Praveen Balasubramanian and Daniel Havey This blog is the sequel to our first Windows Core Networking features announcements post. It describes the second wave of core networking features in the Windows Redstone series. The first wave of features is ... continue reading
Figure 1: Windows Defender ATP detection of Kovter performing process hollowing on regsvr32.exe using mshta.exe

Detecting stealthier cross-process injection techniques with Windows Defender ATP: Process hollowing and atom bombing

Advanced cyberattacks emphasize stealth and persistence: the longer they stay under the radar, the more they can move laterally, exfiltrate data, and cause damage. To avoid detection, attackers are increasingly turning to cross-process injection. Cross-process injection gives attackers the ability ... continue reading

HTTPS Client Certificate Request freezes when the Server is handling a large PUT/POST Request

There is a class of problems that may occur when using client-side certificates in HTTPS. Sometimes, the server’s request for a client certificate will freeze (until the timeout of two minutes or so) when processing PUT/POST request with a large ... continue reading
Storage Spaces Direct on Intel® Xeon® Scalable Processors

Storage Spaces Direct on Intel® Xeon® Scalable Processors

Hello, Claus here again. As you have probably noticed by now, we have a great ongoing collaboration with Intel. In this blog post we are going to look at Windows Server 2016 Storage Spaces Direct on Intel’s latest and greatest ... continue reading
Built-In Administrator Account Lockout

Built-In Administrator Account Lockout

Hello, my name is Jason Krause and this is my first time writing a blog post for AskPFEPlat. I am a Platforms PFE here at Microsoft and work primarily in Active Directory and Group Policy. Recently a customer approached me ... continue reading
KB: Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2

KB: Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2

We have released a new KB article Configuration Manager 2007 client operations fail after you install a May 2017 security update for Windows Server 2008 R2 which contains a solution to the following issue: Client-related operations fail in an installation ... continue reading
Screenshot of CommonSecurityLog

Analyze your Check Point logs with OMS Security

The Security & Compliance solution in the Operations Management Suite (OMS) provides security insights about many sources of security data from Windows and Linux machines, including any source that emits Syslog. Today, we are announcing a new capability, developed by ... continue reading
You can also do this with PowerShell

Learning to Use Vagrant: Tips and Tricks with Vagrant and Hyper-V

A few months ago, I went to DockerCon as a Microsoft representative. While I was there, I had the chance to ask developers about their favorite tools. The most common tool mentioned (outside of Docker itself) was Vagrant. This was ... continue reading
Monitoring Large DPM Deployments with SCOM

Monitoring Large DPM Deployments with SCOM

DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. One way to monitor the DPM servers centrally is using SCOM. In this blog, our guest, John Joyner, talks about leveraging Central Console ... continue reading

Microsoft JDBC Driver 6.2 for SQL Server released

This post was authored by Andrea Lam, Program Manager, SQL Server We are happy to announce the full release of the Microsoft JDBC Driver 6.2 for SQL Server. The JDBC Driver provides Java database connectivity from any Java application, application ... continue reading

Webcast: Intro to Microsoft SQL Server on Linux with containers

With our community technology previews of SQL Server 2017, Microsoft is bringing the industry-leading performance and security of SQL Server to Linux and containers for the first time. SQL Server running on Red Hat Enterprise Linux and Red Hat OpenShift ... continue reading

Troubleshooting Service Manager work item (Incident, Change Request, Service Request) status stuck on “New”

Any time we see newly created work items stuck with a “New” status, it generally means that the Service Manager workflows are not processing or are processing slowly. Monitoring the “Minutes behind” of each workflow can be a useful method ... continue reading
CrossBlogPost Microsoft #AzureStack TP3 in the Classroom for Students #Education #DellEMC

CrossBlogPost Microsoft #AzureStack TP3 in the Classroom for Students #Education #DellEMC

Microsoft Azure Stack in the Classroom for Students Today Microsoft Azure Cloud technology is really going fast with Great innovations for people and their businesses to evolve in what they can do best in a real world. To Learn these ... continue reading
image

ConfigMgr 1702: DRS Activation SPROCS Internals (with Case Study)

Hi Folks, To start with explaining this topic a small background on what is Activation. This is purely a SQL Service broker term. The messages when they are placed in the queue need to be processed, so as a message ... continue reading
Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also ... continue reading
Graphic showing DC/OS and OMS container solution

Docker Swarm and Secret support with OMS Insight and Analytics – container monitoring solution

Hello all, this is Keiko, Program Manager from the OMS team. The container monitoring solution, available as part of OMS Insight and Analytics, helps you get visibility into the inventory of containers in hosts, including images running in them and ... continue reading
Figure 1. Infection cycle overview

Exploring the crypt: Analysis of the WannaCrypt ransomware SMB exploit propagation

On May 12, there was a major outbreak of WannaCrypt ransomware. WannaCrypt directly borrowed exploit code from the ETERNALBLUE exploit and the DoublePulsar backdoor module leaked in April by a group calling itself Shadow Brokers. Using ETERNALBLUE, WannaCrypt propagated as ... continue reading
Windows 10 platform resilience against the Petya ransomware attack

Windows 10 platform resilience against the Petya ransomware attack

The Petya ransomware attack on June 27, 2017 (which we analyzed in-depth in this blog) may have been perceived as an outbreak worse than last month's WannaCrypt (also known as WannaCry) attack. After all, it uses the same SMB exploit ... continue reading