Learn how Azure routes virtual network traffic, customize routing with user-defined routes, and configure BGP for optimal connectivity between Azure and on-premises resources.| learn.microsoft.com
In this tutorial, you learn how to limit and restrict network access to Azure resources, such as an Azure Storage, with virtual network service endpoints.| learn.microsoft.com
In this tutorial, you learn how to filter network traffic to a subnet with a network security group (NSG).| learn.microsoft.com
Learn about Azure service tags and how they simplify security rule creation for Azure Virtual Networks. Discover benefits and best practices.| learn.microsoft.com
Discover how Azure network security groups filter inbound and outbound traffic in virtual networks. Learn NSG rules, traffic flow processing, and best practices for secure Azure networking.| learn.microsoft.com
Learn to create, change, or delete Azure network security groups (NSGs) to control traffic flow and enhance network security with Portal, PowerShell, and CLI examples.| learn.microsoft.com
Learn how to diagnose a virtual machine network traffic filter problem by viewing the effective security rules for a virtual machine.| learn.microsoft.com
Learn how to diagnose a virtual machine routing problem by viewing the effective routes for a virtual machine.| learn.microsoft.com
Learn how application security groups enable you to configure network security policies and group virtual machines.| learn.microsoft.com
Learn about what security admin rules in Azure Virtual Network Manager, how they work, and how traffic rules are evaluated. This includes nonapplication of security admin rules and exceptions.| learn.microsoft.com
Learn about Azure Network Watcher virtual network flow logs and how to use them to record your virtual network's traffic.| learn.microsoft.com
Learn about NSG flow logs feature of Azure Network Watcher, which allows you to log information about IP traffic flowing through a network security group.| learn.microsoft.com
Learn how to migrate your Azure Network Watcher network security group flow logs to virtual network flow logs using the Azure portal and a PowerShell script.| learn.microsoft.com
Understand common Azure subscription and service limits, quotas, and constraints. This article includes information about how to increase limits along with maximum values.| learn.microsoft.com
Learn how to use the FileProfile() to enrich information about files in your advanced hunting query results.| learn.microsoft.com
Use device tags to group devices to capture context and enable dynamic list creation as part of an incident| learn.microsoft.com
Lists details about Microsoft Defender for Endpoint attack surface reduction rules on a per-rule basis.| learn.microsoft.com
Find answers to frequently asked questions about Microsoft Defender for Endpoint's attack surface reduction rules.| learn.microsoft.com
Learn how to ingest incidents, alerts, and raw event data from Microsoft Defender XDR into Microsoft Sentinel.| learn.microsoft.com
Get introduced to the project to profit end-to-end business process. Learn how Dynamics 365 apps can help organizations optimize their project to profit processes.| learn.microsoft.com
Learn about the supported configuration service provider policies for Windows 365 Link| learn.microsoft.com
Use this article to learn more about Microsoft Purview.| learn.microsoft.com
This topic lists the available preview documents. Since this topic is updated frequently, we recommend| learn.microsoft.com
Learn how to manage cross-tenant access in Microsoft Entra External ID. Configure B2B collaboration and direct connect settings to control access and trust for external organizations.| learn.microsoft.com
Learn how to find the Application User Model ID (AUMID) of the applications installed on a Windows device.| learn.microsoft.com
In the Windows Insider Program, be the first to see what's next and help shape Windows' future by running Windows 10 Insider Preview Builds and giving feedback.| learn.microsoft.com
Learn how sensitivity labels from Microsoft Purview Information Protection can protect your organization's sensitive content, wherever it's stored.| learn.microsoft.com
Learn how to build your first .NET Aspire solution using the .NET Aspire Started Application template.| learn.microsoft.com
Learn about the .NET Aspire service defaults project.| learn.microsoft.com
Explore the fundamental concepts of .NET Aspire integrations and learn how to integrate them into your apps.| learn.microsoft.com
How to use the .NET Aspire dashboard standalone.| learn.microsoft.com
Overview of .NET Aspire dashboard and getting started.| learn.microsoft.com
Explore the .NET Aspire dashboard features through the .NET Aspire Starter app.| learn.microsoft.com
Learn about the .NET Aspire templates and how to use them to create new apps.| learn.microsoft.com
Learn the fundamental concepts of .NET Aspire orchestration and explore the various APIs for adding resources and expressing dependencies.| learn.microsoft.com
Learn about essential deployment concepts for .NET Aspire.| learn.microsoft.com
Learn how to deploy a free Azure SQL Managed Instance.| learn.microsoft.com
Guidance on how to deploy the Azure SQL Database offer for up to 10 free databases.| learn.microsoft.com
Azure Microsoft.OperationalInsights/workspaces syntax and properties to use in Azure Resource Manager templates for deploying the resource. API version latest| learn.microsoft.com
Describes the structure and properties of Azure Resource Manager templates (ARM templates) using declarative JSON syntax.| learn.microsoft.com
Understand the Bicep language for deploying infrastructure to Azure. Gain an improved authoring experience over one with JSON to develop templates.| learn.microsoft.com
Deploy and configure Azure Monitor features by using Resource Manager templates.| learn.microsoft.com
Proven guidance and best practices that help you confidently modernize your applications and data.| learn.microsoft.com
Learn how to set Group Policy for Windows Terminal.| learn.microsoft.com
Learn about Microsoft.Testing.Platform, a lightweight way to run tests without depending on the .NET SDK.| learn.microsoft.com
This header is used by Process Status API (PSAPI). For more information, see:| learn.microsoft.com
Implement Microsoft Purview Information Protection capabilities to help you protect sensitive information wherever it lives or travels.| learn.microsoft.com
Learn about Microsoft Defender for Endpoint and maximize the built-in security capabilities to protect devices, detect malicious activity, and remediate threats# Required; article description that is displayed in search results. < 160 chars.| learn.microsoft.com
Guidance on exporting data when migrating from Microsoft Teams to a third-party application.| learn.microsoft.com
Use Microsoft Power Platform to analyze data, build AI-driven agents and custom apps, automate workflows, build websites with Copilot Studio, Power BI, Power Apps, Power Automate, and Power Pages.| learn.microsoft.com
Use Microsoft Spark Utilities, a built-in package, to work with file systems, get environment variables, chain notebooks together, and work with secrets.| learn.microsoft.com
This article gives the basics about how to find and use Transact-SQL (T-SQL) reference articles.| learn.microsoft.com
Reserved Keywords (Transact-SQL)| learn.microsoft.com
Focuses on the Service Bus service used in the Messaging solution to provide best-practice, configuration recommendations, and design considerations related to Operational excellence.| learn.microsoft.com
Use a queue that acts as a buffer between a task and a service that it invokes in order to smooth intermittent heavy loads.| learn.microsoft.com
Use an append-only store to record the full series of events that describe actions taken on data in a domain.| learn.microsoft.com
Let each service decide when and how a business operation is processed, instead of depending on a central orchestrator.| learn.microsoft.com
How to configure row-level security for imported semantic models, and DirectQuery, within the Power BI service.| learn.microsoft.com
Learn how to enroll your Azure subscription for per-user access pricing for Azure Virtual Desktop.| learn.microsoft.com
The Component Object Model is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM is the foundation technology for Microsoft's OLE (compound documents) and ActiveX technologies.| learn.microsoft.com
Learn about the supported RDP properties you can set to customize the behavior of a remote session, such as for device redirection, display settings, session behavior, and more.| learn.microsoft.com
Learn how to remap keyboard keys and shortcuts using PowerToys Keyboard Manager. Customize your Windows keyboard layout and create custom shortcuts for improved productivity.| learn.microsoft.com
Resize images in bulk with PowerToys Image Resizer utility. Learn how to quickly resize multiple images using this Windows shell extension with drag-and-drop support.| learn.microsoft.com
I have Win 11 laptop connected to an external monitor. I have two virtual desktops on my laptop's built-in screen and another two virtual desktops open on the external monitor. Total of 4 virtual desktops simultaneously. When I scroll between two…| learn.microsoft.com
Learn about products and use rights available through Windows commercial licensing.| learn.microsoft.com
Learn more about Microsoft Pluton security processor as Trusted Platform Module (TPM 2.0)| learn.microsoft.com
Information for Windows application developers, hardware developers, and IT pros.| learn.microsoft.com
Provides information about how to achieve secured-core PC compliance with Firmware Attack Surface Reduction (FASR).| learn.microsoft.com
Note Export lifecycle information from the Lifecycle Export page. Microsoft Lifecycle provides consistent and predictable guidelines for support throughout the life of a product, helping customers manage their IT investments and environments while strategically planning for the future. Search below for a list of Microsoft commercial products and services and then select your result to find support and servicing timelines, required updates, migration information, and system requirements.| learn.microsoft.com
This article provides guidance on how version history limits are applied at organization, site, library or OneDrive user account level.| learn.microsoft.com
Learn how Microsoft 365 retention works for SharePoint and OneDrive, using retention policies and retention labels to manage the automatic retention or deletion of data for your organization.| learn.microsoft.com
Learn how subnet delegation in Azure virtual networks enables you to designate specific subnets for Azure PaaS services, providing better control and integration. Discover advantages and implementation steps.| learn.microsoft.com
Learn how to create Azure custom roles with Azure role-based access control (Azure RBAC) for fine-grained access management of Azure resources.| learn.microsoft.com
Use Azure Resource Manager and Azure CLI to create and deploy resource groups to Azure. The resources are defined in an Azure deployment template.| learn.microsoft.com
Learn how to use Azure Resource Manager and the Azure CLI to deploy resources to Azure. The resources are defined in a Bicep file.| learn.microsoft.com
Learn how to create and use a static IP address with the Azure Kubernetes Service (AKS) load balancer.| learn.microsoft.com
Learn how to create and use an internal load balancer to expose your services with Azure Kubernetes Service (AKS).| learn.microsoft.com
Learn about networking in Azure Kubernetes Service (AKS), including kubenet and Azure CNI networking, ingress controllers, load balancers, and static IP addresses.| learn.microsoft.com
Use the application routing add-on to securely access applications deployed on Azure Kubernetes Service (AKS).| learn.microsoft.com
Use Environment Management components in the core solution to automate and manage requests for development resources including data loss prevention or DLP policies.| learn.microsoft.com
Registration and management of passkeys with Microsoft Authenticator on Android and iOS devices.| learn.microsoft.com
Learn how admins can use a Conditional Access Policy to require specific authentication combinations to access a resource.| learn.microsoft.com
Supervisa e informa de la actividad clave del sistema a través del registro de eventos de Windows.| learn.microsoft.com
Instructions on how to mask and unmask the content while using Clarity.| learn.microsoft.com
A reference to Clarity Cookie Consent API Version 1.| learn.microsoft.com
An overview of custom tags in Clarity filters.| learn.microsoft.com
Learn how to use Clarity, a behavioral analysis tool that helps you understand user experience, to make your website or app work better.| learn.microsoft.com
Windows Hello Enhanced Sign-in Security provides your organization an additional level of security using biometrics or PIN.| learn.microsoft.com
Learn how to optimize development practices by standardizing tools and processes. Define consistent practices to optimize efficiency and quality of work.| learn.microsoft.com
Learn how to incorporate an operational excellence approach in your workload for repeatable, reliable, and safe deployments of infrastructure and code.| learn.microsoft.com
Learn how to use the Messaging Bridge pattern to integrate disparate systems built on top of different messaging infrastructures.| learn.microsoft.com
Use eDiscovery (Premium) and the Microsoft Graph Explorer to search for and delete Microsoft 365 Copilot and Microsoft 365 Copilot Chat data.| learn.microsoft.com
Learn how to configure Communication Compliance in Microsoft Purview.| learn.microsoft.com
In this article, you learn how to export, configure, and view Microsoft 365 audit log records.| learn.microsoft.com