From a security perspective the new year has started with a big bang. If you have lost the traction where you get the necessary information for guidance for mitigation and protection from Spectre and Meltdown on Windows Server, Hyper-V, and Azure, then have a look at the following link summary.
Windows Server in general:
Windows Server guidance to protect against speculative execution side-channel vulnerabilities
-> https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution
Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems
-> https://cloudblogs.microsoft.com/microsoftsecure/2018/01/09/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems/
Hyper-V and Hyper-V guest VMs:
Alternative protections for Windows Server 2016 Hyper-V Hosts against the speculative execution side-channel vulnerabilities
-> https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-hosts
Protecting guest virtual machines from CVE-2017-5715 (branch target injection)
-> https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-vms
Microsoft Azure:
Guidance for mitigating speculative execution side-channel vulnerabilities in Azure
-> https://docs.microsoft.com/en-us/azure/virtual-machines/windows/mitigate-se
Securing Azure customers from CPU vulnerability
-> https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/