Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

EJansen_0-1619042827565.png

You Might Want to Audit Your LAPS Permissions….

Deploy LAPS, Check!  You’re all set, right?  Maybe… Hi team, Eric Jansen here again; I’m back after being reminded by a friend and reader that I've been away for too long. I’m trying to be better about it since I have a ton of content that I'd like to share and talk about, but these days ... continue reading

Evolving beyond password complexity as an identity strategy

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Troy Hunt, founder of Have I ... continue reading
🙂

Borrowing a built-in PowerShell command to create a temporary folder

Q: Hey I have a question for you. It seems silly and I know I could probably put something together with Get-Random. But can you think of another way to create a temporary folder with a random name in PowerShell? ... continue reading
Azure Unblogged - Event Hub on Azure Stack Hub

Azure Unblogged – Event Hub on Azure Stack Hub

In this latest episode of Azure Unblogged, I am chatting to Manoj Prasad from the Azure Event Hubs team, to cover how you can leverage Event Hubs on your Azure Stack Hub in your Hybrid Cloud environment. Event Hubs on ... continue reading

Why wait? SaaS-delivered data management for the pace of change

It's incredible to think how much can change in a year. The past year has seen unprecedented digital transformation, with 90 percent of companies reporting cloud usage higher than planned over the past year, according to the Flexera 2021 State ... continue reading
SecretManagement and accessing Linux VMs in Azure

SecretManagement and accessing Linux VMs in Azure

Hello folks, A couple weeks ago I wrote about how I leveraged PowerShell SecretManagement to generalize a demo environment. In that article I only talked about Windows virtual machines running in Azure. However, my colleague Thomas Maurer revisited the topic ... continue reading
image001.png

CSI: Redmond – Episode 1 “Mistaken Identity”

Episode Story Line: A mild mannered IT administrator is doing routine patching when things go south. At first it seems like maybe just a case of the wrong patch for the wrong system but there is more to this story ... continue reading

Afternoon Cyber Tea: Cybersecurity has become a pillar of the business

In a famous two-part episode of “Star Trek: The Next Generation,” Captain Jean-Luc Picard is captured by the Cardassians. During a pivotal scene, a Cardassian interrogator shows Picard four bright lights and demands that he “see” five lights. Picard resists, ... continue reading

Get a unified network monitoring experience with Network Insights

Using Networks Insights to view health, metrics, alerts, and signals from all network monitoring tools in one place, Dalan Mendonca shows Scott Hanselman that there's no need to scramble across tools to troubleshoot your network issues in Azure.[0:00:00]– Intro to ... continue reading
™

Surface expands its Secured-core portfolio with the new Surface Laptop 4 powered by AMD Ryzen™ Mobile Processors

As operating systems are becoming more secure and resistant to compromise, advanced vectors like firmware, kernel and hardware direct memory access (DMA) have emerged as new favored targets for threat actors. Recent trends indicate a substantial growth in the number ... continue reading
Using Managed Identities in Azure Automation Accounts (preview)

Using Managed Identities in Azure Automation Accounts (preview)

Whether it's to repeat common tasks or to automatically respond to a trigger, IT Pros look to automation to help streamline their work and improve their response times. In Azure, runbooks stored in Azure Automation accounts need to use credentials ... continue reading

Is a User A Local Administrator?

Q: Some of the things we do in our logon scripts require the user to be a local administrator. How can the script tell if the user is a local administrator or not, using PowerShell 7. A: Easy using PowerShell ... continue reading
Eric_Woodruff_0-1618498906985.png

Hybrid Identity: Getting Users Aligned

Hey folks, Eric Woodruff here – Customer Engineer still living and breathing in the world of Azure Active Directory. Today we are going to dive into the specifics of how user accounts in Active Directory are matched to user accounts ... continue reading
Architectural diagram displaying CyberMDX integrating with Microsoft Defender for Endpoint.

CyberMDX and Microsoft: Protecting life-saving medical devices

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA. While hospitals continue to battle the COVID-19 pandemic, many are battling other “viruses” behind the scenes. Malware, ransomware, and phishing attacks against healthcare delivery ... continue reading
Using the Serial Console on Windows IaaS VMs

Using the Serial Console on Windows IaaS VMs

If you make a mistake when configuring operating system firewall rules that block you from accessing the VM, or a service is stopping an IaaS VM from booting, or some other configuration problem such as a newly installed application is ... continue reading
Making MsQuic Blazing Fast

Making MsQuic Blazing Fast

It’s been a year since we open sourced MsQuic and a lot has happened since then, both in the industry (QUIC v1 in the final stages) and in MsQuic. As far as MsQuic goes, we’ve been hard at work adding ... continue reading
Stop typing PowerShell credentials in demos using PowerShell SecretManagement

Stop typing PowerShell credentials in demos using PowerShell SecretManagement

We all sometimes create presentations with some PowerShell demos. And often, we need to use credentials to log in to systems for example PowerShell when delivering these presentations. This can lead that we don't use very strong passwords because we ... continue reading
Screen view of security recommendations for network devices and the suggested remediation procedure. Here network device 3 has critical CVEs.

Secure unmanaged devices with Microsoft Defender for Endpoint now

As we have entered into new hybrid work environments, businesses need to think about how they will proactively protect their organizations from the influx of new or “bring your own” (BYO) connected devices. This new normal has exposed the most ... continue reading
magdysalem_1-1618267540439.png

How-To: Deploy Microservice Application with Pod Identity Using Helm Chart

In the last blog we discussed how to deploy AKS fully integrated with AAD. Also we discussed deploying add-on for Azure Pod Identity and Azure CSI driver. In the article we will discuss how to create an application that using ... continue reading

On Prem To The Cloud: Migrating to Azure SQL (episode 7)

Our customers have been wanting some more basic, getting started material on taking their on prem applications and moving them to the cloud. This video series does just that. Starting with a simple on prem solution, lifting and shifting and ... continue reading
Research prototype for high-level network deployment

Empowering operators on their cloud migration journey

For operators, many challenges can be involved in their journey to the cloud, some more complex than others. Here, it is important to note that when it comes to operators’ path to cloud migration, there is no such thing as ... continue reading
Adding a dynamic membership rule to a group in the Azure Portal

Dynamic Groups in Azure AD and Microsoft 365

When I first started in IT, my large organization had an entirely separate "Data Security" team who were responsible for user management - adds/moves/deletes and password resets. They were a small but busy team, handling both calls from users via ... continue reading
Hierarchy of IoT Edge devices to extract data from the automation pyramid

Build secure manufacturing operations with nesting capabilities for Azure IoT Edge

The manufacturing industry continues to rapidly adopt Internet of Things (IoT) technology to optimize productivity, gain efficiencies, increase uptime, and meet sustainability goals. As organizations look to harness IoT across their ecosystems of connected devices, security and compliance continue to ... continue reading
Investigating a unique “form” of email delivery for IcedID malware

Investigating a unique “form” of email delivery for IcedID malware

Microsoft threat analysts have been tracking activity where contact forms published on websites are abused to deliver malicious links to enterprises using emails with fake legal threats. The emails instruct recipients to click a link to review supposed evidence behind ... continue reading

Diagnose and solve problems with Azure API Management Diagnostics

Khaled Zayed joins Scott Hanselman to show how to troubleshoot availability, performance, and policy issues in your API Management service using API Management Diagnostics.[0:00:00]– Introduction[0:03:43]– Demo: Troubleshooting Availability and Performance[0:07:49]– Demo: Troubleshooting Gateway Performance[0:11:59]– Demo: Troubleshooting API Policies[0:13:54]– Wrap-upAzure API ... continue reading
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
pshl-1.png

Leveraging PowerShell SecretManagement to generalize a demo environment

Hello Folks, I’ve been working with some colleagues on a shared demo environment, and one issue came up during a session with customers that highlighted a problem.  If any of us change the local admin password of the servers or ... continue reading
Gamifying machine learning for stronger security and AI models

Gamifying machine learning for stronger security and AI models

To stay ahead of adversaries, who show no restraint in adopting tools and techniques that can help them attain their goals, Microsoft continues to harness AI and machine learning to solve security challenges. One area we’ve been experimenting on is ... continue reading
WhoIAM: Enabling inclusive security through identity protection and fraud prevention

WhoIAM: Enabling inclusive security through identity protection and fraud prevention

Greetings, This is Sue Bohn, Director of Program Management for Identity and Access Management. In this Voice of the Partner blog post, we’ve invited Ajith Alexander, Head of Product Management at WhoIAM, a leading identity and access management (IAM) company, ... continue reading
AndrewCoughlin_0-1617796048972.jpeg

Azure Files: Single Forest Multiple Domain Setup Troubleshooting

Hello everyone, this is Andrew Coughlin and I am a Customer Engineer at Microsoft focusing on Azure IaaS. In this blog I will be discussing an issue I came across while working with one of my customers. I was working ... continue reading