Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

Azure global network

Architect and optimize your internet traffic with Azure routing preference

At Microsoft, we see our customers going through rapid digital transformation to accelerate business growth and empower their employees. And the shift to the digital sphere means a phenomenal growth in internet traffic. The global pandemic has transformed the way ... continue reading

10 Reasons to Love Passwordless #3: Why biometrics and passwordless are a dream combination

The Microsoft identity team recently launched a series explaining why they love passwordless authentication (and why you should too!).The series kicked off with posts on FIDO and NIST compliance. Alex Weinert continues the series with this post speaking to biometric ... continue reading
11.png

Granular Conditional Access for sensitive data and actions

Today I am excited to share how you can maximize user productivity AND protect your most sensitive resources with Conditional Access authentication context. Conditional Access is the Zero Trust control plane that allows you to target policies for access to ... continue reading
mbam.gif

MBAM Server Migration To Microsoft Endpoint Manager

Dear IT Pros, Today we discuss about MBAM's Bitlocker data migration to MEM Microsoft provides a range of flexible BitLocker management alternatives to meet organization’s needs, as follows: Cloud-based BitLocker management using Microsoft Endpoint Manager. On-premises BitLocker management using System ... continue reading
Create a new user with the Microsoft 365 Admin Center

Microsoft 365 user management versus Azure Active Directory

If your organization is using Microsoft 365, you already have Azure Active Directory. It's the identity platform that provides the authentication of your users' credentials when they sign and and the authorization to your Microsoft 365 SaaS applications. If you ... continue reading

Drive successful data-driven transformation—go limitless with Azure data

Over the past year, it's become clear that no business is immune to sudden changes. Embracing data as a strategic asset is key to remaining agile amidst uncertainty. Data can provide crucial insights to help you navigate complex situations, empower ... continue reading

Choose the landing zone for your cloud adoption journey

This post is co-authored by Thomas Maurer, Senior Cloud Advocate, Azure. Tailwind Traders1 is a retail company that is looking to adopt Azure as part of their IT strategy. The IT team is familiar with deploying infrastructure on-premises and is ... continue reading

What to use for monitoring your applications in Azure

Knowing how your application is doing is vital to keep your users happy. In Azure, there are many services that can help you with this. In this episode, Azure Barry shows Scott Hanselman how to choose the right Azure service ... continue reading

Reading a text file bottom up

Q: I have a log file in which new data is appended to the end of the file. That means the most recent entries are at the end of the file. I’d like to be able to read the file ... continue reading
22.png

10 Reasons to Love Passwordless #10: Never use a password

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Pamela Dingle closes the series with a post about the tighter security of passwordless authentication. Here we are at the last ... continue reading

What to use for deploying and testing your applications in Azure

Friends don't let friends right-click deploy. Azure provides many ways to deploy your application. In this episode, Azure Barry shows Scott Hanselman how to choose the right Azure service with which to deploy and test your app.[0:00:00]– Introduction[0:01:23]– Continuous Integration ... continue reading
USB2.jpg

MEM – All Things About USB Drive Management and Troubleshooting

Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading
A diagram showing the Microsoft Cloud App Security and its integration with CSAB solutions

A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security

Today’s business uses an average of 1,180 cloud apps¹, with many of those organizations securing their apps through cloud access security brokers (CASB). The organizational need for a CASB has grown alongside the use of cloud apps to enable remote ... continue reading
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
Techielass_0-1614166562220.png

Windows Admin Center Capabilities

Windows Admin Center is a tool I wish I had had when I was managing servers. When the tool was first announced in 2017 under the name Project “Honolulu”, I was intrigued. I was working for a managed service provider ... continue reading

10 Reasons to Love Passwordless #9: Onboard without a password

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Alex Weinert continues the series with this post in which he describes how much customers are going to benefit from Temporary ... continue reading
Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell

Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell

AksHci PowerShell February Release If you were one of many people who gave us feedback on our December release, we have exciting news for you! In our February release, we’ve delivered one of the most requested features, additional networking options! ... continue reading
Bhavna_Appayya_0-1614748281431.png

Secure your Infrastructure Monitoring with SCOM

Recent high profile cyberattacks have highlighted the importance of having strong standards and features built into infrastructure monitoring and management tools. Microsoft System Center Operations Manager (SCOM) offers world class monitoring capabilities and includes powerful built-in security features. Our increased ... continue reading
Azure Unblogged - Azure Arc Jumpstart Project

Azure Unblogged – Azure Arc Jumpstart Project

In this episode of Azure Unblogged, @thomasmaurer speaks with @liorkamrat about the Azure Arc Jumpstart project. The Azure Arc Jumpstart project is designed to provide a "zero to hero" experience so you can start working with Azure Arc right away!With ... continue reading
M365 Defender Incident Page

Microsoft 365 Defender Incident Overview

Introduction  This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will go over the Microsoft 365 Defender Security Portal and go into detail of the incident ... continue reading
HAFNIUM targeting Exchange Servers with 0-day exploits

HAFNIUM targeting Exchange Servers with 0-day exploits

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to ... continue reading
7.png

10 Reasons to Love Passwordless #7: Authenticator app for easy phone sign-in

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Alex Weinert continues this series. In previous blogs in this series, we shared how passwords lead to breaches, lost productivity ... continue reading
blueprint.png

Azure Blueprints vs Azure Resource Manager template specs

Hello folks, I’ve had a few conversations lately with IT pros and operations folks that made me think that there may be a disconnect or some confusion about the role of Azure blueprints and ARM templates specs. There were comments ... continue reading

4 ways Microsoft is delivering security for all in a Zero Trust world

If there’s one thing the dawning of 2021 has shown, it’s that security isn’t getting any easier. Recent high-profile breach activity has underscored the growing sophistication of today’s threat actors and the complexity of managing business risk in an increasingly ... continue reading
New automation rules in Azure Sentinel

Microsoft unifies SIEM and XDR to help stop advanced attacks

For all of us in security, the last twelve months have been an incredible series of challenges—from balancing remote work with family priorities, to helping build resilient businesses, and protecting against the latest attacks. 2020 showed us that while we ... continue reading

Securing and governing data in a new hybrid work reality

The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading

Moving work items around using the Azure DevOps Migration Tools

In this episode, Abel and Martin will talk about moving Work Item data between Collections, Organizations, and Projects in Azure DevOps and TFS using the Migration Tools. Jump to:[04:44] Where to find the Migration Tools[06:33] Configuring the Migration Tools[11:25] Running ... continue reading
Top 5 things to get the most out of Microsoft Ignite

Top 5 things to get the most out of Microsoft Ignite

We’re one day away from the kick off of Microsoft Ignite digital experience taking place March 2nd-4th starting at 8am PST. I thought it would be a good idea to share some special insights on how to get the most ... continue reading

10 Reasons to Love Passwordless #8: You won’t get phished!

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Maria Puertas Calvo, data scientist for Microsoft Identity, continues the series. Hi! I am honored to be among such a ... continue reading

Lightning Fast and Easy Provisioning of Git with SSH Key Authentication on Windows

Maybe you have a team of Windows developers that are onboarding for your new Git server installation or maybe you’ve decided to drop http password authentication to your existing Git server (due to it’s many problems). Your next steps may ... continue reading