Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

MDE1.jpg

MDE Antivirus Configuration Common Mistakes and Best Practice

_______________________________________________________ John Barbare and Tan Tran Dear IT Pros, We discuss about Microsoft Defender for Endpoint Antivirus Configuration, Policy and exclusion list in detail to avoid making the common mistakes and to apply the best practice to it. Best Practices ... continue reading

How to get better outbound connectivity using Azure NAT Gateway

When your private virtual networks in Azure need to talk to the Internet, a network translation is needed for your applications to talk to endpoints on the Internet. Christian Kuhtz joins Scott Hanselman to show how it works and why ... continue reading
1.PNG

10 Reasons to Love Passwordless #4: Secure your digital estate, while securing your bottom line

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Sue Bohn continues the series. Hello, Today, I'm sharing with you my second reason to love passwordless authentication. Last time, ... continue reading

A playbook for modernizing security operations

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post from our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks ... continue reading
Web shell attacks continue to rise

Web shell attacks continue to rise

One year ago, we reported the steady increase in the use of web shells in attacks worldwide. The latest Microsoft 365 Defender data shows that this trend not only continued, it accelerated: every month from August 2020 to January 2021, ... continue reading
NFS-permissions.png

Mount Blob storage on Linux VM NFS 3.0

Hello Folks! Not so long ago I was working on an internal project that required me to deploy Linux VMs that were hosting a workload that saved a copy of any number of video live feeds to blob storage for ... continue reading
MigIE-Edge.gif

All Things Migration from Internet Explorer to Edge Chromium

Brandon Wilson & Tan Tran Hi IT Pros, We still get the questions about Internet Explorer migration to Edge Chromium once in a while, especially from Government Agency Customers, the questions usually related to the in-house legacy application’ compatibility and ... continue reading

Back up Linux virtual machines running mission-critical workloads

As organizations continue to embrace Linux, we see a growing number of enterprises running business and mission-critical workloads on Linux virtual machines in Azure. Azure Backup service offers application consistent backup of Linux virtual machines in Azure to safeguard against ... continue reading

Ten Reasons to Love Passwordless #3: Why biometrics and passwordless are a dream combination

The Microsoft identity team recently launched a series explaining why they love passwordless authentication (and why you should too!).The series kicked off with posts on FIDO and NIST compliance. Alex Weinert continues the series with this post speaking to biometric ... continue reading
Figure 1. Sample of an Azure Defender alert raised in response to a Dangle DNS record has been detected.

Azure Defender for App Service introduces dangling DNS protection

Resources hosted on Azure App Service are at the forefront as attackers are constantly on the lookout for vulnerabilities in web applications. Dormant domains are a permanent resident on the checklist of both opportunistic and target-oriented attackers. To reduce potential ... continue reading
Azure Unblogged - Azure Policy

Azure Unblogged – Azure Policy

I recently had the pleasure of having a chat with Liz Kim, Senior Product Manager on the Azure Policy team in this new episode of Azure Unblogged. In this episode Liz tells us the journey the product has been on ... continue reading

GitHub Actions on Azure Stack Hub

Azure Stack Hub is now supporting various GitHub Actions. GitHub Actions enable developers to create custom software development life cycle (SDLC) workflows.With GitHub Actions for Azure Stack Hub, users can create workflows to build, test, package, release and deploy to ... continue reading
4.png

10 Reasons to Love Passwordless #2: NIST Compliance

Hello, This is the second post in the “Ten Reasons to Love Passwordless” blog series. Last time, we talked about the flexibility and multi-platform benefits of FIDO2 open standards based technology. The second reason to love passwordless is it brings ... continue reading
Why threat protection is critical to your Zero Trust security strategy

Why threat protection is critical to your Zero Trust security strategy

The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have ... continue reading
azure-file-shares-backup-architecture.png

How to backup and restore Azure file shares

Recently Azure Backup announced support for Azure file share as a workload, in public preview. Sonia took it for a spin! But first ... a word about Public Preview A public preview feature or service is available as a beta ... continue reading
MEM-CMcollection.jpg

MEM – Managing CM Collection in the Cloud Configuration and Troubleshooting

Dear IT pros, As you knew it, starting with Microsoft Endpoint Configuration Manager - MCM version 1906 (SCCM version 1906) you could enable co-management for Endpoint Manager -MEM (Intune) devices in the Azure Public Cloud, Azure US Government Cloud. The ... continue reading
Video screenshot of graphical user interface.

Icertis boosts performance over 80 percent and lowers costs on Azure SQL

As customers grow their mission critical workloads, scaling up to manage spiky workloads in house can become an expensive proposition. Icertis, a leading provider of contract lifecycle management in the cloud, had one such workload managing over 7.5 million contracts ... continue reading

Operational best practices for web apps on Azure App Service

Azure App Service hosts millions of apps, serves trillions of requests per day, and has an SLA of 99.95%. But what should you do when your app has issues in production? Byron Tardif joins Scott Hanselman to discuss some operational ... continue reading

Scale your cloud app with Azure Cache for Redis

Ye Gu joins Scott Hanselman to discuss Azure Cache for Redis, a popular open-source in-memory data store that uses DRAM to store the most frequently used or time-sensitive data for fast retrieval. With it, you can create applications on Azure ... continue reading
4.png

Ten Reasons to Love Passwordless #2: NIST Compliance

Hello, This is the second post in the “Ten Reasons to Love Passwordless” blog series. Last time, we talked about the flexibility and multi-platform benefits of FIDO2 open standards based technology. The second reason to love passwordless is it brings ... continue reading
Eric_Woodruff_0-1612548756170.png

Azure AD: Custom Application Consent Policies

Hey folks, Eric Woodruff here – a Customer Engineer who lives in the world of Azure Active Directory. Today we are going to be examining custom app consent policies in Azure Active Directory, and how you can leverage them for ... continue reading

Sophisticated cybersecurity threats demand collaborative, global response

Microsoft’s response to Solorigate Since December, the United States, its government, and other critical institutions including security firms have been addressing the world’s latest serious nation-state cyberattack, sometimes referred to as ‘Solorigate’ or ‘SUNBURST.’ As we shared earlier this is ... continue reading
An infographic that shows the flow of context-aware discovery based on machine learning.

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading

Modernizing your network security strategy

From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. Some of these challenges we can’t change. However, I’m pleased about the ones we can, and are changing across the cybersecurity landscape ... continue reading
Number of DDoS attacks during COVID-19 outbreak

Azure DDoS Protection—2020 year in review

This blog post was co-authored by Anupam Vij, Principal PM Manager & Syed Pasha, Principal Network Engineer, Azure Networking. 2020 was a year unlike any other. It brought major disruptions to both the physical and digital worlds, and these changes ... continue reading

Innovations for a more secure U.S. microelectronics supply chain

Keeping up with the rapid pace of technology innovation today requires equal advances in the pace of development of new microelectronics. At the same time, customers are increasingly focused on securing the technology supply chain all the way to the ... continue reading

Afternoon Cyber Tea: Privacy, the pandemic, and protecting our cyber future

Much of our everyday life has moved online with the pandemic continuing to play a role in how we work and communicate with others. This migration has meant that security and privacy continue to remain top-of-mind for both security professionals ... continue reading
bwatts670_0-1611844320508.png

Network Security Group Monitoring

Intro Brad Watts here to explore monitoring of your Network Security Groups (NSGs). I was approached recently by a customer wanting to better understand changes being made to the many NSGs in their environment. Working with them, we came up ... continue reading
White text on black background: Azure Synapse and Qlik Data Integration and Power BI Free proof of value for SAP.

Gain real-time insights on SAP ERP data with Azure and Qlik Data Integration

For companies worldwide, SAP is at the core of their business applications—housing critical information on sales, manufacturing, and financial processes. Organizations increasingly need granular, real-time visibility about their business by combining SAP ERP data with other data from their different ... continue reading
password.jpg

10 Reasons to love Passwordless #1: FIDO Rocks

Over the next few weeks, the Microsoft Identity team will share 10 reasons to love passwordless and why you should consider changing how you (and your users) login every day. Kicking off the series is Pamela Dingle. I love passwordless ... continue reading