Learn about the five pillars of the Azure Well-Architected Framework and how they can produce a high- quality, stable, and efficient cloud architecture.| learn.microsoft.com
Learn how to optimize development practices by standardizing tools and processes. Define consistent practices to optimize efficiency and quality of work.| learn.microsoft.com
Learn how to incorporate an operational excellence approach in your workload for repeatable, reliable, and safe deployments of infrastructure and code.| learn.microsoft.com
Learn how to use the Messaging Bridge pattern to integrate disparate systems built on top of different messaging infrastructures.| learn.microsoft.com
Use eDiscovery (Premium) and the Microsoft Graph Explorer to search for and delete Microsoft 365 Copilot and Microsoft 365 Copilot Chat data.| learn.microsoft.com
Learn how to configure Communication Compliance in Microsoft Purview.| learn.microsoft.com
In this article, you learn how to export, configure, and view Microsoft 365 audit log records.| learn.microsoft.com
Use Microsoft Purview to help you protect and manage data security and compliance protections for generative AI apps such as Microsoft 365 Copilot, Microsoft Facilitator, ChatGPT Enterprise, and more.| learn.microsoft.com
Microsoft introduced the data protection application programming interface (DPAPI) in Windows.| learn.microsoft.com
Discover the Group Policy, registry key, local security policy, and credential delegation policy settings that are available for configuring smart cards.| learn.microsoft.com
See how to get started with Windows Local Administrator Password Solution (Windows LAPS) and Windows Server Active Directory.| learn.microsoft.com
Learn how to get started with Windows Local Administrator Password Solution (Windows LAPS) in legacy Microsoft LAPS emulation mode.| learn.microsoft.com
Learn how to get started with Windows Local Administrator Password Solution (Windows LAPS) and Microsoft Entra ID.| learn.microsoft.com
Documents password and passphrase details for Windows Local Administrator Password Solution (Windows LAPS).| learn.microsoft.com
Documents account management modes for Windows Local Administrator Password Solution (Windows LAPS).| learn.microsoft.com
Windows Server is the platform for building an infrastructure of connected applications, networks, and web services, from the workgroup to the data center.| learn.microsoft.com
Find the documentation you need to troubleshoot issues and apply workarounds for the following commercial products from Microsoft.| learn.microsoft.com
Summary of planned features for Dynamics 365 Finance.| learn.microsoft.com
Learn more about working with Microsoft Graph permissions to allow your app to access your data securely.| learn.microsoft.com
Learn about Microsoft Graph national cloud deployments and the capabilities that are available to developers within each.| learn.microsoft.com
To call Microsoft Graph, you must register your app with the Microsoft identity platform, request permissions, and acquire an access token.| learn.microsoft.com
Represents the result of a Conditional Access What If evaluation, which indicates the policies that would apply based on the sign-in details you provide.| learn.microsoft.com
Represents the identity that is signing in| learn.microsoft.com
Represents the context of the authentication event as defined in the Conditional Access What If evaluation.| learn.microsoft.com
Represents sign-in parameters of the identity that is authenticating| learn.microsoft.com
Microsoft Graph is the gateway to data and intelligence in Microsoft 365. Use Microsoft Graph to build intelligent apps, derive insights and analytics, and extend Microsoft 365 experiences.| learn.microsoft.com
Learn how conditions are used in Microsoft Entra Conditional Access to trigger a policy.| learn.microsoft.com
Using the Microsoft Entra Conditional Access insights and reporting workbook to troubleshoot policies.| learn.microsoft.com
What are session controls in a Microsoft Entra Conditional Access policy| learn.microsoft.com
Analyze Conditional Access policy impact using report-only mode and other tools.| learn.microsoft.com
Learn how Conditional Access templates provide preconfigured policies to secure your environment, aligned with Microsoft recommendations.| learn.microsoft.com
Understand the phases of Conditional Access policy enforcement in Microsoft Entra and how to apply them to secure user access.| learn.microsoft.com
Grant controls in a Microsoft Entra Conditional Access policy.| learn.microsoft.com
Evaluates the applicability of Conditional Access Policies based on the provided sign-in properties.| learn.microsoft.com
Secure your Azure, hybrid, and multicloud resources with Microsoft Defender for Cloud, a cloud-native application protection platform (CNAPP) that utilizes both cloud security posture management (CSPM), and Cloud workload protection platform (CWPP) to protect your Azure, AWS, GCP and on premises environments.| learn.microsoft.com
Translates virtual-key messages into character messages. The character messages are posted to the calling thread's message queue, to be read the next time the thread calls the GetMessage or PeekMessage function.| learn.microsoft.com
The GetMessage function retrieves a message from the calling thread's message queue. (GetMessage)| learn.microsoft.com
The DispatchMessage function dispatches a message to a window procedure. It is typically used to dispatch a message retrieved by the GetMessage function.| learn.microsoft.com
Learn about data encryption in Windows 365.| learn.microsoft.com
DBCC SHRINKDATABASE shrinks the size of the data and log files in the specified database.| learn.microsoft.com
In this article, you learn how to set up SharePoint agents for pay-as-you-go billing.| learn.microsoft.com
In this article, you learn about how to create and view insights on SharePoint agents in SharePoint and OneDrive sites.| learn.microsoft.com
Learn about SharePoint Advanced Management and how you can use its features before and after deploying Copilot.| learn.microsoft.com
Quickstart showing how to Create a budget with an Azure Resource Manager template.| learn.microsoft.com
Quickstart showing how to create a budget with Bicep.| learn.microsoft.com
You use Billing features to manage billing accounts, invoices, and purchased products. You also use the features to monitor and control Azure spending and to optimize Azure resource use.| learn.microsoft.com
SharePoint documentation for IT professionals and admins| learn.microsoft.com
Your app must be registered with Microsoft Entra ID. Registering your app establishes a trust relationship and allows the app to access protected resources in the Microsoft cloud.| learn.microsoft.com
Business Central is a business management solution for small and mid-sized organizations. It connect sales, service, finance, and operations to work smarter, adapt faster, and perform better. Business Central automates and streamlines business processes and helps you manage your business.| learn.microsoft.com
Learn about the content filtering capabilities of Azure OpenAI.| learn.microsoft.com
Understand how large language models (LLMs) use tokens to analyze semantic relationships and generate natural language outputs| learn.microsoft.com
Manifests are XML files that accompany and describe side-by-side assemblies or isolated applications.| learn.microsoft.com
If your application depends on a specific version of a shared DLL, and another application is installed with a newer or older version of that DLL, then that can cause a problem; it can cause your app to start to fail. Another use case for DLL redirection is to load a private build of a DLL.| learn.microsoft.com
Protect your system from Insecure Library Loading & Remote Code Execution with Microsoft Security Updates. Learn more at Microsoft.com.| learn.microsoft.com
The second of three tutorials that will show you how to work with plug-ins.| learn.microsoft.com
Use the plugin trace log to store plug-in execution information to aid in plug-in debugging.| learn.microsoft.com
Learn about the Fabric notebook public APIs, including how to create and get a notebook with definition, and run a notebook on demand.| learn.microsoft.com
Learn how to create a new notebook, import an existing notebook, connect notebooks to lakehouses, collaborate in notebooks, and comment code cells.| learn.microsoft.com
Learn how to author, execute, and manage Microsoft Fabric notebook jobs with rich built-in features.| learn.microsoft.com
Learn about the relationship between application and service principal objects in Microsoft Entra ID.| learn.microsoft.com
Learn about Azure DevOps Services - an integrated platform for planning, coding, building, testing, and deploying applications.| learn.microsoft.com
Share common variables across pipelines using variable groups.| learn.microsoft.com
Learn the basics about Azure Pipelines and explore the different features available for both YAML and Classic pipelines.| learn.microsoft.com
Learn how end users, app makers, admins, and developers can use Power Apps to meet business needs by transforming manual operations into digital processes.| learn.microsoft.com
Learn how to enable feedback for a table| learn.microsoft.com
Named modules in C++20 provide a modern alternative to header files.| learn.microsoft.com
Learn how to import the C++ standard library (STL) using modules from the command line| learn.microsoft.com
Reference article for the schtasks query command, which lists all the tasks scheduled to run on the computer.| learn.microsoft.com
Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.| learn.microsoft.com
Just My Code is a debugging feature that automatically steps over calls to non-user code. Learn how to enable, disable, and use this feature.| learn.microsoft.com
Learn how to enable direct access to Azure resources from a virtual network using service endpoints.| learn.microsoft.com
Learn how to create a virtual network rule that enables traffic to an Azure Storage account from subnets in an Azure Virtual Network.| learn.microsoft.com
Learn about the list of trusted Azure services that you can allow in network settings.| learn.microsoft.com
Configure the Azure Storage firewall to accept requests from resource instances.| learn.microsoft.com
Learn about how to set up network security for Azure Storage accounts.| learn.microsoft.com
Learn about the restrictions and limitations for Azure Storage firewall configuration.| learn.microsoft.com
Learn how to create an IP network rule that enables traffic to an Azure Storage account from IP address ranges.| learn.microsoft.com
Learn about the different ways to authorize access to data in Azure Storage. Azure Storage supports authorization with Microsoft Entra ID, Shared Key authorization, or shared access signatures (SAS), and also supports anonymous access to blobs.| learn.microsoft.com
The ExpressRoute Technical Overview explains how an ExpressRoute connection works to extend your on-premises network to Azure over a private connection.| learn.microsoft.com
Add a role assignment condition to restrict access to blobs using the Azure portal and Azure attribute-based access control (Azure ABAC).| learn.microsoft.com
Learn how to grant access to Azure resources for users, groups, service principals, or managed identities using the Azure portal and Azure role-based access control (Azure RBAC).| learn.microsoft.com
Prerequisites for Azure role assignment conditions.| learn.microsoft.com
Get an overview of Azure attribute-based access control (Azure ABAC). Use role assignments with conditions to control access to Azure resources.| learn.microsoft.com
The FILE_OBJECT structure is used by the system to represent a file object.| learn.microsoft.com
This topic shows how to use DirectX with Advanced Color scenarios—including high dynamic range, wide color gamut with automatic system color management, and high bit-depth.| learn.microsoft.com
Provides a mechanism for controlling access to securable objects.| learn.microsoft.com
See how to share devices with Hyper-V virtual machines. Find out how to give a virtual machine access to USB devices, audio, microphones, and mounted drives.| learn.microsoft.com
Reference article for the robocopy command, which copies file data from one location to another.| learn.microsoft.com
Use the Content search eDiscovery tool in the Microsoft Purview portal to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for Business.| learn.microsoft.com
Microsoft Purview offers three eDiscovery tools that you can use to search for and export content found in different locations such as Exchange mailboxes, SharePoint and OneDrive for Business sites, Microsoft 365 Groups, Microsoft Teams, and Skype for Business conversations. eDiscovery (Standard) and eDiscovery (Premium) provide many additional features to help you manage your investigations.| learn.microsoft.com
AzCopy is a command-line utility that you can use to copy data to, from, or between storage accounts. This article helps you download AzCopy, connect to your storage account, and then transfer data.| learn.microsoft.com
Learn to use .NET to create applications on any platform using C#, F#, and Visual Basic. Browse API reference, sample code, tutorials, and more.| learn.microsoft.com
Learn how the garbage collector works and how it can be configured for optimum performance.| learn.microsoft.com
Learn how to add a Windows line-of-business (LOB) app using Microsoft Intune.| learn.microsoft.com
Learn about the Extended Security Updates (ESU) program for Windows 10. The ESU program gives customers the option to receive security updates for Windows 10.| learn.microsoft.com
This document is the master document that contains all the links required to start working with Workflow Orchestration Manager.| learn.microsoft.com