Select Page

Microsoft Cloud Library

Articles about Microsoft Cloud

Latest news and technical articles related to cloud computing with Windows Server. We have carefully selected articles published by industry experts, featuring Microsoft’s engineering team.

Select a Topic to view articles of just that Topic. Select All to view the entire library.

John_Barbare_0-1636498280387.png

Fixing Mobile Devices in Non-Compliant Status – MEM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog, I will be focusing on Mobile Devices in Non-Compliance status after applying a Security Update ... continue reading
Column chart showing number of notifications for 2019, 2020, and 2021

Iranian targeting of IT sector on the rise

Iranian threat actors are increasing attacks against IT services companies as a way to access their customers’ networks. This activity is notable because targeting third parties has the potential to exploit more sensitive organizations by taking advantage of trust and ... continue reading
Video 5 of the Azure VMware Solution Zero to Hero Series!

Video 5 of the Azure VMware Solution Zero to Hero Series!

Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover monitoring and operations for Azure VMware Solution, taking you from zero closer to ... continue reading
Three icons representing data at rest, in transit, and in use.

Adopting a Zero Trust approach throughout the lifecycle of data

Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading
Modernize server management with System Center and Windows Admin Center

Modernize server management with System Center and Windows Admin Center

Welcome to the fourth episode of 'From the RoK to the Cloud' season two. In this series, Tom Hall chats with some amazing people from around the Microsoft universe, about anything to do with Windows Server. In today's episode were ... continue reading

Bringing commercial innovations in chip design to national security

Semiconductors and microelectronics are some of the most important components in building cutting-edge capabilities for our national security and defense technologies, from satellites and radar to vehicles and communications equipment. Ensuring these components are developed with the utmost regard for ... continue reading

Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365

Sophisticated cyberattacks are on the rise, with email phishing as the most common attack vector. We’ve seen it all over the news with stories like Hafnium that targeted Exchange servers1 or the Nobelium attack against SolarWinds,2 which show just how ... continue reading

The importance of identity and Microsoft Azure Active Directory resilience

I love hearing my colleagues explain how they came to the industry because so many of their stories are unusual. I’m surprised how often I hear that people got into computer science by some fortuitous accident. Although he loved computers ... continue reading
Timeline showing dates, threat actor, and malware payload of ransomware attacks by Iranian threat actors

Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021

Over the past year, the Microsoft Threat Intelligence Center (MSTIC) has observed a gradual evolution of the tools, techniques, and procedures employed by malicious network operators based in Iran. At CyberWarCon 2021, MSTIC analysts presented their analysis of these trends ... continue reading

DevOps Lab | What is GitOps? Why we need it and how to implement it.

Roberth Strand from Crayon joins April today to help us understand GitOps as an operation model - how does GitOps enable faster and more secure deployments - and where to go to learn more about it.Jump to:[01:45] What is GitOps[03:41] ... continue reading
What's the difference between Azure AD Graph, Azure Resource Graph and Microsoft Graph?

What's the difference between Azure AD Graph, Azure Resource Graph and Microsoft Graph?

It started with a tweet. Microsoft MVP Joe Stocker shared Alex Simon's article "Automate and manage Azure AD tasks at scale with the Microsoft Graph PowerShell SDK", where Derrick Kimani (Microsoft Identity Division Program Manager) lays out the plan for ... continue reading
Step-by-Step Guide: Active Directory Migration from Windows Server 2008 R2 to Windows Server 2022

Step-by-Step Guide: Active Directory Migration from Windows Server 2008 R2 to Windows Server 2022

Windows Server 2008 and Windows Server 2008 R2 Operating system reached the end of their support cycle on the 14th of January 2020. Because of this many organizations wanted to migrate away from these legacy operating systems. End-of-life operating systems ... continue reading
Open Systems’ MDR integration with Microsoft.

How Open Systems uses Microsoft tools to improve security maturity

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. We’ve all seen it happen—an organization has all the top-notch security tools in place and still, they get breached. In today’s rapidly evolving threat landscape, ... continue reading
Diagram showing how adaptive protection works

AI-driven adaptive protection against human-operated ransomware

In human-operated ransomware attacks, threat actors use predictable methods to enter a device but eventually rely on hands-on-keyboard activities to move inside a network. To fortify our existing cloud-delivered automated protection against complex attacks like human-operated ransomware, we developed a ... continue reading

Achieving Zero Trust readiness in your apps #1: Why it matters

Hello! I’m Jeff Sakowicz, Principal Program Management Lead for Application Platform Security within the Microsoft Identity team. Our team’s goal is to foster a secure, trustworthy, and thriving app ecosystem. Part of achieving this goal is enabling apps to support ... continue reading
John_Barbare_0-1636495244009.png

Application Guard Deployment by MECM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will be focusing on Application Guard and the correct configuration/deployment for Microsoft Endpoint Configuration ... continue reading

Deploy OpenAPI enabled Azure Functions with .NET in Visual Studio

Justin Yoo joins Scott Hanselman to demonstrate an extension he developed for adding OpenAPI capabilities to Azure Functions apps. See how easy it is to get HTTP-triggered .NET functions with OpenAPI support and deploy an Azure Functions app with Azure ... continue reading

Looking at Azure yesterday, today, and tomorrow with Jason Zander

Jason Zander, executive vice president of the Azure Team joins Scott Hanselman to celebrate the 8th anniversary of Azure Friday. In this special crossover episode with Hanselminutes, they reflect on Azure's history and Jason's career at Microsoft during that timeframe.[0:00:00]– ... continue reading

How to assess and improve the security culture of your business

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with Cygenta ... continue reading
Diagram showing typical attack chain of HTML smuggling

HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks

HTML smuggling, a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features, is increasingly used in email campaigns that deploy banking malware, remote access Trojans (RATs), and other payloads related to targeted attacks. Notably, this technique was ... continue reading
Video 4 of the Azure VMware Solution Zero to Hero Series!

Video 4 of the Azure VMware Solution Zero to Hero Series!

Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover the deployment steps for Azure VMware Solution, taking you from zero closer to ... continue reading
NedPyle_0-1636579987465.png

Windows Server upgrade and lifecycle survey

Heya folks, Ned here again. I just published a survey for IT Pros on Windows Server upgrades and lifecycle - it's only 5 minutes of your time, totally anonymous, and will help us with planning to make your life easier ... continue reading
The Upgrade to Windows 11 Software Update is not Returned as Applicable

The Upgrade to Windows 11 Software Update is not Returned as Applicable

The software update to upgrade to Windows 11 published to WSUS may not be returned as applicable to Windows 10 devices for several reasons. Devices running Windows 10, version 1909 should be patched up to October 12, 2021 (KB5006667) or ... continue reading

The hunt for NOBELIUM, the most sophisticated nation-state attack in history

This is the second in a four-part blog series on the NOBELIUM nation-state cyberattack. In December 2020, Microsoft began sharing details with the world about what became known as the most sophisticated nation-state cyberattack in history. Microsoft’s four-part video series ... continue reading
Windows Server 2022 - Hybrid Cloud with Azure Arc

Windows Server 2022 – Hybrid Cloud with Azure Arc

Welcome to the third episode of 'From the RoK to the Cloud' season two! In this series, Tom Hall chats with some amazing people from around the Microsoft universe, about anything to do with Windows Server. To kick off season ... continue reading

DevOps Lab | Increasing Collaboration with Communication: GitHub and Microsoft Teams

On this week's episode, Jay Gordon is here to walk us through how to use the features in Microsoft Teams to streamline communication when changes to GitHub repos occur. He'll demo how to improve collaboration and efficiency using the tools ... continue reading
ChristianKielhorn_12-1636488021862.png

How to retrieve an Azure AD Bulk Token with PowerShell

Hi, my Name is Christian Kielhorn, and I’m a Senior Customer Engineer – formerly known as Premier Field Engineer – within Germanys Customer Success Organization for Modern Work. Today I’d like to come back to a customer’s question – as ... continue reading
Screenshot of commands related to credential dumping

Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus

Microsoft has detected exploits being used to compromise systems running the ZOHO ManageEngine ADSelfService Plus software versions vulnerable to CVE-2021-40539 in a targeted campaign. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating ... continue reading

PASS Data Community Summit keynote: a bridge to a new universe

It is almost time for PASS Data Community Summit 2021, a free online conference for the Microsoft data platform professional. The conference, hosted by Redgate, will include the latest SQL Server and Azure data innovations, practical training, and networking to ... continue reading
First-party engineering systems for hardware and software, Firmware and driver security, physical security, manufacturing security, logistics security, supplier security, trust chain governance and resilience, security validations and assurances, and monitoring and detections.

Learn how Microsoft strengthens IoT and OT security with Zero Trust

As cyber threats grow more sophisticated and relentless, the need for Cybersecurity Awareness Month becomes more urgent every year. As part of our year-round commitment to security for all, Microsoft continues to track numerous incidents targeting both digital and physical ... continue reading