Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Integrating with Azure DevOps and DAS Deployer!

Damian sits down with Martin Woodward at Microsoft Ignite 2019 to talk about interoperability with Azure DevOps in the coolest way possible. The DAS Deployer is a fun project using a Raspberry Pi, some Python, and the Azure DevOps REST ... continue reading
ASB1

Monitor your Azure workload compliance with Azure Security Benchmark

The Azure Security Benchmark v1 was released in January 2020 and is being used by organizations to manage their security and compliance policies for their Azure workloads. We are pleased to share that you can now track and monitor your ... continue reading
How to run your user group on Microsoft Teams

How to run your user group on Microsoft Teams

I’ve been running the Glasgow Azure User Group for the best part of three years now. We have six in person events every two months. We’ve had the privilege of having a lot of local speakers as well as international ... continue reading
Create an engine for business-changing insights with Azure Synapse Analytics to serve data for immediate BI and machine learning needs.

Learn how to deliver insights faster with Azure Synapse Analytics

Today, it’s even more critical to have a data-driven culture. Analytics and AI play a pivotal role in helping businesses make insights-driven decisions—decisions to transform supply chains, develop new ways to interact with customers, and evaluate new offerings. Many organizations ... continue reading
Update to the Configuration Manager Client Messaging SDK

Update to the Configuration Manager Client Messaging SDK

We are happy to announce that an updated version of the Configuration Manager Client Messaging SDK, version 5.2006.1037.1000 is now available on NuGet.org.The following issues have been fixed in this release: BITS downloads and uploads may fail if communicating with ... continue reading

CISO stress-busters: post #1 overcoming obstacles

As part of the launch of the U.S. space program’s moon shot, President Kennedy famously said we do these things “not because they are easy, but because they are hard.” The same can be said for the people responsible for ... continue reading

Azure Blob Storage enhancing data protection and recovery capabilities

Enterprises, partners, and IT professionals store business-critical data in Azure Blob Storage. We are committed to providing the best-in-class data protection and recovery capabilities to keep your applications running. Today, we are announcing the general availability of Geo-Zone-Redundant Storage (GZRS)—providing ... continue reading
Newest VM scale-in policy example. The VM with ID 9 is deleted first during scale-in which is the newest created VM. Next, the VM with ID 7 is deleted during scale-in because the VM with ID 8 is a protected VM.

Azure Virtual Machine Scale Sets now provide simpler management during scale-in

We recently announced the general availability of three features for Azure Virtual Machine Scale Sets. Instance protection, custom scale-in policy, and terminate notification provide new capabilities to simplify management of virtual machine instances during scale-in. Azure Virtual Machine Scale Sets ... continue reading
 Windows Virtual Desktop high level architecture

Use Azure Firewall for secure and cost-effective Windows Virtual Desktop protection

This post was co-authored by Pavithra Thiruvengadam, Program Manager, Windows Virtual Desktop Work from home policies require many IT organizations to address fundamental changes in capacity, network, security, and governance. Many employees aren't protected by the layered security policies associated ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Pt 6 – M365 Integration

For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading

Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations

In our day-to-day work, we focus on helping customers advance the security of their digital estate using the native capabilities of Azure. In the process, we frequently find that using Azure to improve an organization’s cybersecurity posture can also help ... continue reading
Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 1

Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 1

Here is Helder Pinto PFE presenting the first post of a series dedicated to the implementation of automated Continuous Optimization with Azure Advisor Cost recommendations. We can define Continuous Optimization (CO) in the context of Microsoft Azure and IT environments ... continue reading
Diagram showing the steps for the STAMINA approach: pre-processing, transfer learning, and evaluation

Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification

The opportunities for innovative approaches to threat detection through deep learning, a category of algorithms within the larger framework of machine learning, are vast. Microsoft Threat Protection today uses multiple deep learning-based classifiers that detect advanced threats, for example, evasive ... continue reading

Protect your accounts with smarter ways to sign in on World Passwordless Day.

For many of us, working from home will be a new norm for the foreseeable future. We see many opportunities for using passwordless methods to better secure digital accounts that people rely on every day. Whether you’re protecting an organization ... continue reading
DBada_0-1588313799157.png

Azure AD Mailbag: What is identity provisioning and why does it matter?

This is Sue Bohn, Partner Director of Program Management for Identity and Access Management. We're back with another mailbag focusing on your common questions on Azure Active Directory provisioning. A key Identity and Access Management (IAM) component, provisioning makes sure ... continue reading

Azure HPC Cache – File caching for high-performance computing (HPC)

Scott Jeschonek joins Scott Hanselman to talk about Azure HPC Cache. Whether you are rendering a movie scene, searching for variants in a genome, or running machine learning against a data set, HPC Cache can provide very low latency high ... continue reading
Az Update: Azure VMware Solutions, Custom Role creation, Run Command and more!

Az Update: Azure VMware Solutions, Custom Role creation, Run Command and more!

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
Protect your accounts with smarter ways to sign in on World Passwordless Day

Protect your accounts with smarter ways to sign in on World Passwordless Day

As the world continues to grapple with COVID-19, our lives have become increasingly dependent on digital interactions. Operating at home, we’ve had to rely on e-commerce, telehealth, and e-government to manage the everyday business of life. Our daily online usage ... continue reading
Digging into the Replica Domain Controller ARM Template Code

Digging into the Replica Domain Controller ARM Template Code

If you are here because you want some automation built into your world vs. manual domain controller builds + configuration, then you’ve arrived at the right place! Two hot topics come into view when discussing ARM Templates: Configuration Management and ... continue reading
MISA1

How to gain 24/7 detection and response coverage with Microsoft Defender ATP

This blog post is part of the Microsoft Intelligence Security Association guest blog series. To learn more about MISA, go here. Whether you’re a security team of one or a dozen, detecting and stopping threats around the clock is a ... continue reading
How to run scripts in your Azure VM by using Run Command

How to run scripts in your Azure VM by using Run Command

As you know, you can access your Azure virtual machine (VM) in multiple ways, like SSH or RDP. However, if you have issues with the RDP or SSH network configuration, the Run Command feature is another option. Run Command can ... continue reading
Event sourcing pattern based on Azure Cosmos DB workflow diagram.

Minecraft Earth and Azure Cosmos DB part 1: Extending Minecraft into our real world

This post is part 1 of a two-part series about how organizations use Azure Cosmos DB to meet real world needs and the difference it’s making to them. In part 1, we explore the challenges that led service developers for ... continue reading

Minecraft Earth and Azure Cosmos DB part 2: Delivering turnkey geographic distribution

This post is part 2 of a two-part series about out how organizations are using Azure Cosmos DB to meet real world needs and the difference it’s making to them. In part 1, we explored the challenges that led service ... continue reading
Installing SQL 2016 for Configuration Manager in a PubSec Environment

Installing SQL 2016 for Configuration Manager in a PubSec Environment

Hello, my name is Chris Vetter and I am a Premier Field Engineer with Microsoft. I am here to discuss Installing SQL Server 2016 for Configuration Manager in a PubSec Environment. The intent of this guide is to install SQL ... continue reading
romblog1.png

Updates to Azure AD Conditional Access report-only mode, insights & reporting, and troubleshooting

Howdy folks, As organizations adjust to employees working from home, they’ve told us their priority is enabling employees to work remotely while maintaining security, productivity, and collaboration. Azure AD Conditional Access can ensure that the right people have the access ... continue reading

Shifting Left: Testing in a DevOps world with SOFY

Trying to maintain both quality and speed is a real challenge, and testing methodologies can either aid or downshift the acceleration rapid application development. See how using right tools, continuous integration can address these challenges so that testing is no ... continue reading
Azure AD security enforcement with Continuous Access Evaluation

Azure AD security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading
Remote work using Azure VPN Gateway.

How Azure VPN helps organizations scale remote work

In the weeks and months we have all been grappling with the global pandemic, there’s no doubt about the impact it has had on the lives of people everywhere. A shift to remote work is one of the widespread effects ... continue reading
PaulIvey_0-1588689706130.png

Orchestration Groups with Microsoft Endpoint Configuration Manager

With the release of Microsoft Endpoint Configuration Manager version came an exciting and highly-anticipated feature known as orchestration groups. Orchestration groups are an evolution of the server groups feature, allowing a greater level of control to the deployment of software ... continue reading

Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2

This is the sixth blog in the Lessons learned from the Microsoft SOC series designed to share our approach and experience from the front lines of our security operations center (SOC) protecting Microsoft and our Detection and Response Team (DART) ... continue reading