Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Forging a path from telco to cloud with Microsoft Azure

This blog was co-authored by Angel Shimelish, Sr. Product Marketing Manager, Azure for Operators. Across industries, organizations are venturing deeper into their digital transformation journeys every day, and the telco industry is no exception. Angel Shimelish recently sat down with ... continue reading
Video 5 of the Azure VMware Solution Zero to Hero Series!

Video 5 of the Azure VMware Solution Zero to Hero Series!

Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover monitoring and operations for Azure VMware Solution, taking you from zero closer to ... continue reading
Three icons representing data at rest, in transit, and in use.

Adopting a Zero Trust approach throughout the lifecycle of data

Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading
Modernize server management with System Center and Windows Admin Center

Modernize server management with System Center and Windows Admin Center

Welcome to the fourth episode of 'From the RoK to the Cloud' season two. In this series, Tom Hall chats with some amazing people from around the Microsoft universe, about anything to do with Windows Server. In today's episode were ... continue reading

Bringing commercial innovations in chip design to national security

Semiconductors and microelectronics are some of the most important components in building cutting-edge capabilities for our national security and defense technologies, from satellites and radar to vehicles and communications equipment. Ensuring these components are developed with the utmost regard for ... continue reading

Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365

Sophisticated cyberattacks are on the rise, with email phishing as the most common attack vector. We’ve seen it all over the news with stories like Hafnium that targeted Exchange servers1 or the Nobelium attack against SolarWinds,2 which show just how ... continue reading

The importance of identity and Microsoft Azure Active Directory resilience

I love hearing my colleagues explain how they came to the industry because so many of their stories are unusual. I’m surprised how often I hear that people got into computer science by some fortuitous accident. Although he loved computers ... continue reading
Timeline showing dates, threat actor, and malware payload of ransomware attacks by Iranian threat actors

Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021

Over the past year, the Microsoft Threat Intelligence Center (MSTIC) has observed a gradual evolution of the tools, techniques, and procedures employed by malicious network operators based in Iran. At CyberWarCon 2021, MSTIC analysts presented their analysis of these trends ... continue reading

DevOps Lab | What is GitOps? Why we need it and how to implement it.

Roberth Strand from Crayon joins April today to help us understand GitOps as an operation model - how does GitOps enable faster and more secure deployments - and where to go to learn more about it.Jump to:[01:45] What is GitOps[03:41] ... continue reading
What's the difference between Azure AD Graph, Azure Resource Graph and Microsoft Graph?

What's the difference between Azure AD Graph, Azure Resource Graph and Microsoft Graph?

It started with a tweet. Microsoft MVP Joe Stocker shared Alex Simon's article "Automate and manage Azure AD tasks at scale with the Microsoft Graph PowerShell SDK", where Derrick Kimani (Microsoft Identity Division Program Manager) lays out the plan for ... continue reading
Step-by-Step Guide: Active Directory Migration from Windows Server 2008 R2 to Windows Server 2022

Step-by-Step Guide: Active Directory Migration from Windows Server 2008 R2 to Windows Server 2022

Windows Server 2008 and Windows Server 2008 R2 Operating system reached the end of their support cycle on the 14th of January 2020. Because of this many organizations wanted to migrate away from these legacy operating systems. End-of-life operating systems ... continue reading
Open Systems’ MDR integration with Microsoft.

How Open Systems uses Microsoft tools to improve security maturity

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. We’ve all seen it happen—an organization has all the top-notch security tools in place and still, they get breached. In today’s rapidly evolving threat landscape, ... continue reading
Diagram showing how adaptive protection works

AI-driven adaptive protection against human-operated ransomware

In human-operated ransomware attacks, threat actors use predictable methods to enter a device but eventually rely on hands-on-keyboard activities to move inside a network. To fortify our existing cloud-delivered automated protection against complex attacks like human-operated ransomware, we developed a ... continue reading

Achieving Zero Trust readiness in your apps #1: Why it matters

Hello! I’m Jeff Sakowicz, Principal Program Management Lead for Application Platform Security within the Microsoft Identity team. Our team’s goal is to foster a secure, trustworthy, and thriving app ecosystem. Part of achieving this goal is enabling apps to support ... continue reading
John_Barbare_0-1636495244009.png

Application Guard Deployment by MECM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will be focusing on Application Guard and the correct configuration/deployment for Microsoft Endpoint Configuration ... continue reading

Deploy OpenAPI enabled Azure Functions with .NET in Visual Studio

Justin Yoo joins Scott Hanselman to demonstrate an extension he developed for adding OpenAPI capabilities to Azure Functions apps. See how easy it is to get HTTP-triggered .NET functions with OpenAPI support and deploy an Azure Functions app with Azure ... continue reading

How to assess and improve the security culture of your business

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with Cygenta ... continue reading
Diagram showing typical attack chain of HTML smuggling

HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks

HTML smuggling, a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features, is increasingly used in email campaigns that deploy banking malware, remote access Trojans (RATs), and other payloads related to targeted attacks. Notably, this technique was ... continue reading
Video 4 of the Azure VMware Solution Zero to Hero Series!

Video 4 of the Azure VMware Solution Zero to Hero Series!

Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover the deployment steps for Azure VMware Solution, taking you from zero closer to ... continue reading
NedPyle_0-1636579987465.png

Windows Server upgrade and lifecycle survey

Heya folks, Ned here again. I just published a survey for IT Pros on Windows Server upgrades and lifecycle - it's only 5 minutes of your time, totally anonymous, and will help us with planning to make your life easier ... continue reading

The hunt for NOBELIUM, the most sophisticated nation-state attack in history

This is the second in a four-part blog series on the NOBELIUM nation-state cyberattack. In December 2020, Microsoft began sharing details with the world about what became known as the most sophisticated nation-state cyberattack in history. Microsoft’s four-part video series ... continue reading
Branded graphic and black text on a light background for Azure IaaS Day.

5 reasons to attend the Azure IaaS Day digital event

There’s still time to register for Azure IaaS Day, a free digital event on Wednesday, November 17, 2021, from 9:00 AM to 11:00AM Pacific Time. Join us to hear more about IaaS innovations, engage with industry leaders and product experts, ... continue reading
Windows Server 2022 - Hybrid Cloud with Azure Arc

Windows Server 2022 – Hybrid Cloud with Azure Arc

Welcome to the third episode of 'From the RoK to the Cloud' season two! In this series, Tom Hall chats with some amazing people from around the Microsoft universe, about anything to do with Windows Server. To kick off season ... continue reading

DevOps Lab | Increasing Collaboration with Communication: GitHub and Microsoft Teams

On this week's episode, Jay Gordon is here to walk us through how to use the features in Microsoft Teams to streamline communication when changes to GitHub repos occur. He'll demo how to improve collaboration and efficiency using the tools ... continue reading
ChristianKielhorn_12-1636488021862.png

How to retrieve an Azure AD Bulk Token with PowerShell

Hi, my Name is Christian Kielhorn, and I’m a Senior Customer Engineer – formerly known as Premier Field Engineer – within Germanys Customer Success Organization for Modern Work. Today I’d like to come back to a customer’s question – as ... continue reading

Discover what’s new to Microsoft database services—recap from Microsoft Ignite

Whether it’s SQL Server, Azure SQL, open source, or NoSQL, Microsoft’s database services are here to help you build cloud-native applications or modernize existing applications with fully managed, flexible databases. Last week at Microsoft Ignite, there were many announcements to ... continue reading
AMD logo

Azure high-performance computing at Supercomputing 2021

Customers around the world rely on Microsoft Azure to drive innovations related to our environment, public health, energy sustainability, weather modeling, economic growth, and more. Finding solutions to these important challenges requires huge amounts of focused computing power. Customers are ... continue reading
datacenter global infrastructure on a world map for cloud computing

Learn how Microsoft Azure is accelerating hardware innovations for a sustainable future

This year’s theme for OCP Global Summit is Open Possibilities, and in the Microsoft Azure team, we wholeheartedly agree—we have been part of tremendous creativity and resiliency as the community continued to collaborate, despite the challenges posed by the pandemic ... continue reading
Screenshot of commands related to credential dumping

Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus

Microsoft has detected exploits being used to compromise systems running the ZOHO ManageEngine ADSelfService Plus software versions vulnerable to CVE-2021-40539 in a targeted campaign. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating ... continue reading

PASS Data Community Summit keynote: a bridge to a new universe

It is almost time for PASS Data Community Summit 2021, a free online conference for the Microsoft data platform professional. The conference, hosted by Redgate, will include the latest SQL Server and Azure data innovations, practical training, and networking to ... continue reading