Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

GAIA-X gets new support with European Eclipse Data Connector

Data has an increasingly important role in strengthening business models and offering improved public services but much of its potential remains untapped. Data sharing is an essential element to the promise of unlocking new business opportunities and broader economic growth ... continue reading
Graphic illustrates the steps, goals, and initial questions in DART’s ransomware investigation assistance.

A guide to combatting human-operated ransomware: Part 1

This blog is part one of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our human-operated ransomware docs page ... continue reading
AZ-800 Study Guide: Administering Windows Server Hybrid Core Infrastructure

AZ-800 Study Guide: Administering Windows Server Hybrid Core Infrastructure

In this exam guide you’ll see which MS Learn modules map against exam functional groups and which docs.microsoft.com articles map against specific exam objective items for the AZ-800 Administering Windows Server Hybrid Core Infrastructure exam. This exam is required for ... continue reading
Introducing the Windows Server Hybrid Administrator Associate certification

Introducing the Windows Server Hybrid Administrator Associate certification

Today at Windows Server Summit, Microsoft announced a new Windows Server Hybrid Administrator Associate certification, a certification that members of the team responsible for this blog have been highly involved in developing. To obtain this certification you need to pass ... continue reading
Enhance your Log Analytics data exploration in Azure Data Studio

Enhance your Log Analytics data exploration in Azure Data Studio

The Azure Monitor Logs extension in Azure Data Studio is now available in preview. The extension is supported in Azure Data Studio August 2021 release, v1.32.0.Administrators can enable platform logging and metrics to one of their Azure services such as ... continue reading
Screenshot of code showing the original exploit vector

Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability

In August, Microsoft Threat Intelligence Center (MSTIC) identified a small number of attacks (less than 10) that attempted to exploit a remote code execution vulnerability in MSHTML using specially crafted Microsoft Office documents. These attacks used the vulnerability, tracked as ... continue reading
Azure Arc - enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

Azure Arc – enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

In this video, I had the chance to speak with Dhananjay Mahajan @dhanMMS (Principal Program Manager at Microsoft) about how you can run Azure Arc enabled data services on Azure Stack HCI with Azure Kubernetes Service (AKS). This provides you ... continue reading

Windows 11 Insider 22449 update for SMB compression

Heya folks, Ned here again. We released a change to SMB compression for Windows 11 Insider Preview build 22449 & later. We stopped being so algorithmically cute: when you request compression, we now just try to do it because you ... continue reading
Azure Monitor Diagram

Alert Based on Log to Metrics Feature on Azure Monitor

Hi all, I’m Edoardo, and I work in Microsoft as a Customer Engineer, where I’m focused on Azure Monitor and Azure Infrastructure. The idea of this article was born during a delivery, when a customer asked me if it was ... continue reading
Top 6 tips for configuring a new Microsoft Azure environment

Top 6 tips for configuring a new Microsoft Azure environment

A sparkling new Microsoft Azure environment is a beautiful thing, but before you start creating resources, what should you configure first? The Microsoft Cloud Adoption Framework has detailed guidance on defining your strategy, planning for the cloud, getting ready with ... continue reading

Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors

Information has long been wielded as an instrument of national power and influence. In today’s digital world, misinformation can also be just as powerful. On a special episode of Afternoon Cyber Tea with Ann Johnson, Sandra Joyce, Executive Vice President ... continue reading

Get a secure baseline architecture for Azure Kubernetes Service (AKS)

Derek Martin joins Scott Hanselman to discuss the Azure Kubernetes Service (AKS) Secure Baseline reference implementation from the Azure Architecture Center. Learn what it is, how it works, and how you can use it to start your production deployment in ... continue reading

Combat attacks with security solutions from Trustwave and Microsoft

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In 2021, cyberattacks and instances of ransomware demands against companies, agencies, and institutions have dominated the headlines. These kinds of attacks are on the rise ... continue reading
Bernardo Caldas

Get a first look at Windows Server 2022—register for the free Windows Server Summit

You are invited to get a first look deep-dive at Windows Server 2022 by registering for the free, fourth annual Windows Server Summit, September 16, 2021, from 10:00 AM 11:30 AM Pacific Time. Be among the initial set of customers ... continue reading

Why diversity is important for a strong cybersecurity team

Medicine. Aeronautics. Academia. When you’re a cybersecurity professional, the colleague next to you could have started in one of these industries—or just about any other you can imagine. The backgrounds of cybersecurity professionals are more diverse than those of professionals ... continue reading
PowerShell Basics: Query Azure Role Based Access Control Assignments

PowerShell Basics: Query Azure Role Based Access Control Assignments

A great way to learn PowerShell is to set up a scenario in the Azure portal, then try different PowerShell commands to see if you can get the same results. In this article, we'll use Azure Role Based Access control, ... continue reading
An image of Azure Firewall Premium SKU with a drop down menu for the new auto-generated certification mechanism.

Boost your network security with new updates to Azure Firewall

This post was co-authored by Eliran Azulai, Principal Program Manager, Azure Networking. Today, we are announcing new Azure Firewall capabilities as well as updates for August 2021. Azure Firewall supports US West 3, Jio India West, and Brazil Southeast. Auto-generated ... continue reading
Multi-zone Windows Server Failover Cluster with shared ZRS disk

Improve availability with zone-redundant storage for Azure Disk Storage

As organizations continue to accelerate their cloud adoption, the need for reliable infrastructure is critical to ensure business continuity and avoid costly disruptions. Azure Disk Storage provides maximum resiliency for all workloads with an industry-leading zero percent annual failure rate ... continue reading

Open sourcing the .NET 5 C# Language Extension for SQL Server

For over two decades, the C# programming language has allowed developers to build secure and robust applications within the .NET ecosystem.SQL Server 2019 supports the R, Python, and Java Language Extensions. These language extensions provide many benefits to developers. They ... continue reading
Azure Unblogged - Azure Confidential Computing

Azure Unblogged – Azure Confidential Computing

In this episode of Azure Unblogged, Thomas Maurer speaks with Stefano Tempesta about Azure Confidential computing. Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment (TEE). While cloud-native workloads data is ... continue reading
Microsoft's recommended mitigation prioritizations: prepare, limit, and prevent.

3 steps to prevent and recover from ransomware

On July 14, 2021, the National Cybersecurity Center of Excellence1 (NCCoE) at the National Institute of Standards and Technology2 (NIST) hosted a virtual workshop3 to seek feedback from government and industry experts on practical approaches to preventing and recovering from ... continue reading

DevOps Lab | Infra as Code in Action: Secrets management | Ep 2 of 4-episode series

April Edwards and Christopher Maneu are back for part two of this four-part series, Infra as Code in Action! Today, they'll be talking about secrets management! Is it really important to keep secrets? Yes! And there's more to it than ... continue reading
An image in white text that reads deploy more intelligent solutions with AI and advanced technologies download the white paper

4 ways AI, computer vision, and related technologies expand IoT solutions

Inspecting five million vehicle welds every day requires the ability to check a weld’s quality every 17 milliseconds—an impossible challenge for a human. This type of quality control task is just one of many where the combined technologies of computer ... continue reading
Create MECM Windows Server 2022 Device Collection

Create MECM Windows Server 2022 Device Collection

With the release of Windows Server 2022 I was deploying a new server into a Microsoft Endpoint Configuration Manager lab that I have for certain scenarios and one of the tasks I wanted to do was create a Device Collection ... continue reading
wernerrall_0-1628084204317.png

Azure & Desired State Configuration Part 4/4

Part 1 : Focus on Desired State Configuration in PowerShell Part 2 : Focus on Deploying with DevOps Pipeline Part 3 : Focus on Azure Automation Account Part 4 : Focus on DSC in Automation Account What will I need? ... continue reading
Onboard partners more easily with new Azure AD entitlement management features

Onboard partners more easily with new Azure AD entitlement management features

Onboarding partners cleanly and efficiently is now easier because of two recently introduced entitlement management features in Azure Active Directory – custom questions and attribute collection. Today, we’re highlighting how these features work and sharing how they help with processes ... continue reading

Eliminate data silos with NFS 3.0 support for Azure Blob Storage

Yuan Zheng joins Scott Hanselman to discuss and demonstrate Blob storage support for the NFS 3.0 protocol, which enables you to run your applications on a single storage platform. With no application rewrites necessary you will also help eliminate data ... continue reading
Screenshot of code showing instance of SSH

A deep-dive into the SolarWinds Serv-U SSH vulnerability

Several weeks ago, Microsoft detected a 0-day remote code execution exploit being used to attack the SolarWinds Serv-U FTP software in limited and targeted attacks. The Microsoft Threat Intelligence Center (MSTIC) attributed the attack with high confidence to DEV-0322, a ... continue reading
Affinity.png

New Features of Windows Server 2022 Failover Clustering

Greetings again Windows Server and Failover Cluster fans!!  John Marlin here and I own the Failover Clustering feature within the Microsoft product team.  In this blog, I will be giving an overview of the new features in Windows Server 2022 ... continue reading
Secure access to Amazon Managed Grafana with Azure AD

Secure access to Amazon Managed Grafana with Azure AD

Our customers tell us that the applications and services they use to succeed extend across clouds and platforms. It’s why we are committed that our identity solutions work seamlessly and securely across platforms and extend to all clouds and apps ... continue reading