0% found this document useful (0 votes)
39 views48 pages

Sample

Uploaded by

Davi Mazui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views48 pages

Sample

Uploaded by

Davi Mazui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

Exam Ref AZ-800

Administering Windows
Server Hybrid Core
Infrastructure

Orin Thomas

9780137729265_print.indb 1 28/06/22 5:44 PM


Exam Ref AZ-800 Administering Windows Server
Hybrid Core Infrastructure EDITOR-IN-CHIEF
Published with the authorization of Microsoft Corporation by: Brett Bartow
Pearson Education, Inc.
EXECUTIVE EDITOR
Loretta Yates
Copyright © 2023 by Orin Thomas
SPONSORING EDITOR
All rights reserved. This publication is protected by copyright, and permission Charvi Arora
must be obtained from the publisher prior to any prohibited reproduction,
storage in a retrieval system, or transmission in any form or by any means, DEVELOPMENT EDITOR
electronic, mechanical, photocopying, recording, or likewise. For information Songlin Qiu
regarding permissions, request forms, and the appropriate contacts within the TECHNICAL EDITOR
Pearson Education Global Rights & Permissions Department, please visit Andrew Warren
www.pearson.com/permissions.
MANAGING EDITOR
No patent liability is assumed with respect to the use of the information con- Sandra Schroeder
tained herein. Although every precaution has been taken in the preparation of
this book, the publisher and author assume no responsibility for errors or omis- SENIOR PROJECT EDITOR
sions. Nor is any liability assumed for damages resulting from the use of the Tracey Croom
information contained herein. COPY EDITOR
Elizabeth Welch
ISBN-13: 978-0-13-772926-5
ISBN-10: 0-13-772926-X INDEXER
Tim Wright
Library of Congress Control Number: 2022938820
PROOFREADER
Barbara Mack
ScoutAutomatedPrintCode
EDITORIAL ASSISTANT
TRADEMARKS Cindy Teeters
Microsoft and the trademarks listed at http://www.microsoft.com on the
COVER DESIGNER
“Trademarks” webpage are trademarks of the Microsoft group of companies.
Twist Creative, Seattle
All other marks are property of their respective owners.
COMPOSITOR
WARNING AND DISCLAIMER
codeMantra
Every effort has been made to make this book as complete and as accurate as
possible, but no warranty or fitness is implied. The information provided is on
an “as is” basis. The author, the publisher, and Microsoft Corporation shall have
neither liability nor responsibility to any person or entity with respect to any
loss or damages arising from the information contained in this book or from
the use of the programs accompanying it.

SPECIAL SALES
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs;
and content particular to your business, training goals, marketing focus, or
branding interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.

For government sales inquiries, please contact


[email protected].

For questions about sales outside the U.S., please contact


[email protected].

9780137729265_print.indb 2 28/06/22 5:44 PM


Pearson’s Commitment to Diversity, Equity,
and Inclusion
Pearson is dedicated to creating bias-free content that reflects the diversity of all learners. We
embrace the many dimensions of diversity, including but not limited to race, ethnicity, gender,
socioeconomic status, ability, age, sexual orientation, and religious or political beliefs.
Education is a powerful force for equity and change in our world. It has the potential to
deliver opportunities that improve lives and enable economic mobility. As we work with
authors to create content for every product and service, we acknowledge our responsibility to
demonstrate inclusivity and incorporate diverse scholarship so that everyone can achieve their
potential through learning. As the world’s leading learning company, we have a duty to help
drive change and live up to our purpose to help more people create a better life for themselves
and to create a better world.
Our ambition is to purposefully contribute to a world where
■ Everyone has an equitable and lifelong opportunity to succeed through learning
■ Our educational products and services are inclusive and represent the rich diversity of
learners
■ Our educational content accurately reflects the histories and experiences of the learners
we serve
■ Our educational content prompts deeper discussions with learners and motivates them
to expand their own learning (and worldview)
While we work hard to present unbiased content, we want to hear from you about any con-
cerns or needs with this Pearson product so that we can investigate and address them.
Please contact us with concerns about any potential bias at https://www.pearson.com/
report-bias.html.

iii

9780137729265_print.indb 3 28/06/22 5:44 PM


This page intentionally left blank

Z01_Thomas_index_p269-286.indd 283 01/07/22 2:30 PM


Contents at a glance

Introduction xiii

CHAPTER 1 Deploy and manage Active Directory Domain Services


in on-premises and cloud environments 1
CHAPTER 2 Manage Windows Servers and workloads in a hybrid
environment 99
CHAPTER 3 Manage virtual machines and containers 127
CHAPTER 4 Implement and manage an on-premises and hybrid
networking infrastructure 185
CHAPTER 5 anage storage an file ser ices 233

Index 269

9780137729265_print.indb 5 28/06/22 5:44 PM


This page intentionally left blank

Z01_Thomas_index_p269-286.indd 283 01/07/22 2:30 PM


Contents

Introduction xiii
Organization of this book xiii
Microsoft certifications xiv
Quick access to online references xiv
Errata, updates, & book support xiv
Stay in touch xv

Chapter 1 Deploy and manage Active Directory Domain Services


in on-premises and cloud environments 1
Skill 1.1: Deploy and manage AD DS domain controllers . . . . . . . . . . . . . . . . . . .1
Deploy and manage domain controllers on-premises 2
Deploy and manage domain controllers in Azure 23
Deploy read-only domain controllers (RODCs) 24
Troubleshoot flexible single master operations (FSMO) roles 26

Skill 1.2 Configure and manage multi-site, multi-domain, and


multi-forest environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Configure and manage forest and domain trusts 29
Configure and manage AD DS sites 35
Configure and manage AD DS replication 41

Skill 1.3: Create and manage AD DS security principals . . . . . . . . . . . . . . . . . . 45


Create and manage AD DS users and groups 45
Manage users and groups in multi-domain and
multi-forest scenarios 47
Implement group managed service accounts (GMSAs) 48
Join Windows Servers to AD DS, Azure AD DS, and Azure AD 52

Skill 1.4: Implement and manage hybrid identities . . . . . . . . . . . . . . . . . . . . . . 54


Implement Azure AD Connect 54
Manage Azure AD Connect Synchronization 65
Implement Azure AD Connect cloud sync 67
Manage Azure AD DS 68

vii

9780137729265_print.indb 7 28/06/22 5:44 PM


Integrate Azure AD, AD DS, and Azure AD DS 71
Manage Azure AD Connect Health 72
Manage authentication in on-premises and hybrid
environments 73
Configure and manage AD DS passwords 74

Skill 1.5: Manage Windows Server by using domain-based


Group Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Implement Group Policy in AD DS 83
Implement Group Policy preferences in AD DS 93
Implement Group Policy in Azure AD DS 95

Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Thought experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Thought experiment answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Chapter 2 Manage Windows Servers and workloads


in a hybrid environment 99
Skill 2.1: Manage Windows Servers in a hybrid environment . . . . . . . . . . . . . 99
Choose administration tools 100
Deploy a WAC gateway server 102
Configure a target machine for WAC 105
Manage Azure hybrid services with WAC 105
Configure PowerShell remoting 105
Configure CredSSP or erberos Delegation for
second hop remoting 108
Configure ust Enough Administration for PowerShell
remoting 109

Skill 2.2: Manage Windows Servers and workloads by using


Azure Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
Manage Windows Servers by using Azure Arc 114
Assign Azure Policy guest configuration 116
Deploy Azure services using the Azure VM extensions on
non-Azure machines 117
Manage updates for Windows machines 118
Integrate Windows Servers with Log Analytics 120
Integrate Windows Servers with Microsoft Defender
for Cloud 121
viii Contents

9780137729265_print.indb 8 28/06/22 5:44 PM


Manage IaaS VMs in Azure that run Windows Server 122
Create runbooks to automate tasks on target VMs 123
Implement Azure Automation for hybrid workloads 123
Implement Desired State Configuration to prevent
configuration drift in IaaS machines 124

Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Thought experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Thought experiment answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

Chapter 3 Manage virtual machines and containers 127


Skill 3.1: Manage Hyper-V and guest virtual machines. . . . . . . . . . . . . . . . . . 127
Virtual machine types 128
Manage VM using PowerShell remoting, PowerShell
Direct, and HVC.exe 129
Enable VM Enhanced Session Mode 130
Configure nested virtualization 130
Configure VM memory 131
Configure integration services 133
Configure Discrete Device Assignment 133
Configure VM resource groups 134
Configure VM CPU groups 135
Configure hypervisor scheduling types 135
Manage VM checkpoints 136
Implement high availability for virtual machines 137
Manage VHD and VHD files 148
Configure Hyper-V network adapter 153
Configure NIC teaming 156
Configure Hyper-V switch 156

Skill 3.2: Create and manage containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158


Understand container concepts 158
Manage Windows Server container images 163
Manage container instances 167
Configure container networking 168
Create Windows Server container images 171

Contents ix

9780137729265_print.indb 9 28/06/22 5:44 PM


Skill 3.3: Manage Azure Virtual Machines that run Windows Server . . . . . 173
Administer IaaS VMs 173
Manage data disks 174
Resize Azure VM 175
Configure continuous delivery for an Azure VM 176
Configure connections to VMs 176
Manage Azure VM network configuration 179

Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

Thought experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

Thought experiment answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

Chapter 4 Implement and manage an on-premises and


hybrid networking infrastructure 185
Skill 4.1: Implement on-premises and hybrid name resolution . . . . . . . . . . 185
Integrate DNS with AD DS 186
Create and manage zones and records 188
Configure DNS forwarding/conditional forwarding 192
Integrate Windows Server DNS with Azure DNS private zones 193
Implement DNSSEC 194
Manage Windows Server DNS 195

Skill 4.2: Manage IP addressing in on-premises and hybrid


scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Implement and manage IPAM 200
Implement and configure the DHCP server role 203
Resolve IP address issues in hybrid environments 204
Create and manage scopes 204
Create and manage IP reservations 208
Implement DHCP high availability 209

Skill 4.3: Implement on-premises and hybrid network connectivity . . . . . 210


Implement and manage the Remote Access role 210
Implement and manage Azure Network Adapter 219
Implement and manage Azure Extended Network 219
Implement and manage Network Policy Server role 220
Implement Web Application Proxy 227

x Contents

9780137729265_print.indb 10 28/06/22 5:44 PM


Implement Azure Relay 227
Implement site-to-site VPN 228
Azure ExpressRoute 228
Implement Azure Virtual WAN 229
Implement Azure AD Application Proxy 229
Use Azure App Service Hybrid Connections 230

Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

Thought experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

Thought experiment answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

Chapter 5 Manage storage and file services 233


Skill 5.1 Configure and manage Azure File Sync . . . . . . . . . . . . . . . . . . . . . . . 233
Create Azure File Sync Service 234
Create sync groups 235
Create cloud endpoints 235
Register servers 235
Create server endpoints 236
Configure cloud tiering 237
Monitor File Sync 237
Migrate DFS to Azure File Sync 238

Skill 5.2 Configure and manage Windows Server File Shares . . . . . . . . . . . 239
Configure Windows Server File Share access 239
Configure file screens 241
Configure File Server Resource Manager uotas 243
Use additional FSRM functionality 244
Configure ranchCache 247
Implement and configure Distributed File System 248

Skill 5.3 Configure Windows Server Storage . . . . . . . . . . . . . . . . . . . . . . . . . . 251


Configure disks and volumes 251
Configure and manage storage spaces 252
Configure and manage Storage Replica 257
Configure data deduplication 260
Configure SM Direct 261

Contents xi

9780137729265_print.indb 11 28/06/22 5:44 PM


Configure Storage oS 262
Configure filesystems 263

Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

Thought experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

Thought experiment answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Index 269

xii Contents

9780137729265_print.indb 12 28/06/22 5:44 PM


Introduction

T he AZ-800 exam deals with advanced topics that require candidates to have an excellent
working knowledge of Windows Server and Azure Hybrid functionality. Some of the exam
comprises topics that even experienced Windows Server Hybrid administrators may rarely
encounter unless they are consultants who manage hybrid cloud workloads on a regular basis.
To be successful in taking this exam, not only do candidates need to understand how to deploy
and manage AD DS, hybrid identity, Windows Servers, virtual machines, containers, hybrid
networks, and storage services, but they also need to know how to perform these tasks with
on-premises and Azure IaaS instances of Windows Server.
Candidates for this exam are information technology (IT) professionals who want to validate
their advanced Windows Server Hybrid administration skills and knowledge. To pass, candi-
dates require a thorough theoretical understanding as well as meaningful practical experience
implementing the technologies involved.
This edition of this book covers Windows Server and the AZ-800 exam objectives as of
mid-2022. As Windows Server hybrid technologies evolve, so do the AZ-800 exam objectives,
so you should check carefully if any changes have occurred since this edition of the book was
authored and study accordingly.
This book covers every major topic area found on the exam, but it does not cover every
exam question. Only the Microsoft exam team has access to the exam questions, and Microsoft
regularly adds new uestions to the exam, making it impossible to cover specific uestions.
You should consider this book a supplement to your relevant real-world experience and other
study materials. If you encounter a topic in this book that you do not feel completely comfort-
able with, use the Need more review links you ll find in the text to find more information
and take the time to research and study the topic. Great information is available on Microsoft
Docs, Microsoft Learn, and in blogs and forums.

Organization of this book


This book is organized by the “Skills measured” list published for the exam. The “Skills mea-
sured” list is available for each exam on Microsoft Learn: https://microsoft.com/learn. Each
chapter in this book corresponds to a major topic area in the list, and the technical tasks in
each topic area determine a chapter’s organization. If an exam covers six major topic areas, for
example, the book will contain six chapters.

xiii

A01_Thomas_FM-pi-xviii.indd 13 01/07/22 2:32 PM


Microsoft certifications
Microsoft certifications distinguish you by proving your command of a broad set of skills and
experience with current Microsoft products and technologies. The exams and corresponding
certifications are developed to validate your mastery of critical competencies as you design
and develop, or implement and support, solutions with Microsoft products and technologies
both on-premises and in the cloud. Certification brings a variety of benefits to the individual
and to employers and organizations.

NEED MORE REVIEW ALL MICROSOFT CERTIFICATIONS


For in ormation about icroso t certifications inclu ing a ull list o a ailable certifications
go to http://www.microsoft.com/learn.com/learn.

Check back often to see what is new!

Quick access to online references


Throughout this book are addresses to webpages that the author has recommended you visit
for more information. Some of these addresses (also known as URLs) can be painstaking to
type into a web browser, so we’ve compiled all of them into a single list that readers of the print
edition can refer to while they read.
Download the list at
MicrosoftPressStore.com/ExamRefAZ800/downloads
The URLs are organized by chapter and heading. Every time you come across a URL in the
book, find the hyperlink in the list to go directly to the webpage.

Errata, updates, & book support


We’ve made every effort to ensure the accuracy of this book and its companion content. You
can access updates to this book—in the form of a list of submitted errata and their related
corrections—at:
MicrosoftPressStore.com/ExamRefAZ800/errata
If you discover an error that is not already listed, please submit it to us at the same page.
For additional book support and information, please visit
http://www.MicrosoftPressStore.com/Support.

xiv Introduction

9780137729265_print.indb 14 28/06/22 5:44 PM


Please note that product support for Microsoft software and hardware is not offered
through the previous addresses. For help with Microsoft software or hardware, go to
http://support.microsoft.com.

Stay in touch
Let’s keep the conversation going! We’re on Twitter: http://twitter.com/MicrosoftPress.

Introduction xv

9780137729265_print.indb 15 28/06/22 5:44 PM


This page intentionally left blank

Z01_Thomas_index_p269-286.indd 283 01/07/22 2:30 PM


About the author
ORIN THOMA S is a Principal Cloud Advocate at Microsoft and has written more than 3 dozen
books for Microsoft Press on such topics as Windows Server, Windows Client, Azure, Office 365,
System Center, Exchange Server, Security, and SQL Server. He has authored Azure Architecture
courses at Pluralsight and has authored multiple Microsoft Official Curriculum and Ed courses
on a variety of IT Pro topics. You can follow him on Twitter at http://twitter.com/orinthomas.

xvii

9780137729265_print.indb 17 28/06/22 5:44 PM


This page intentionally left blank

Z01_Thomas_index_p269-286.indd 283 01/07/22 2:30 PM


CHAPTER 2

Manage Windows Servers


and workloads in a hybrid
environment
A critical element in any complex hybrid cloud deployment is the set of tools used to man-
age, maintain, and monitor workloads. Windows Server hybrid administrators have several
options when it comes to choosing which tools they will use to manage the Windows Server
instances that they are responsible for. Some tools allow you to manage up to the cloud from
an on-premises administrative workstation; other tools allow you to manage down from the
cloud from the Azure portal or Azure CLI.

Skills covered in this chapter:


■ Skill 2.1: Manage Windows Servers in a hybrid environment
■ Skill 2.2: Manage Windows Servers and workloads by using Azure Services

Skill 2.1: Manage Windows Servers in a hybrid


environment
This objective deals with the technologies and techniques that you can use to manage Windows
Server instances in on-premises and cloud environments. You’ll learn about choosing and con-
figuring administration tools as well as constrained delegation and ust Enough Administration.

This skill covers how to:


■ Choose administration tools
■ Deploy a WAC gateway server
■ Configure a target machine for WAC
■ Manage Azure hybrid services with WAC
■ Configure PowerShell remoting
■ Configure CredSSP or erberos Delegation for second hop remoting
■ Configure ust Enough Administration for PowerShell remoting

99

9780137729265_print.indb 99 28/06/22 5:45 PM


Choose administration tools
You can use a variety of tools to manage Windows Server 2019. Some, such as PowerShell, the
Microsoft Management Console, and Server Manager, are built into the operating systems.
You’ll need to download others, such as Windows Admin Center, for free from the Microsoft
website.
The company’s general systems administration philosophy is that while you can do almost
everything with a graphical console such as Windows Admin Center, Active Directory Admin-
istrative Center, or the Server Manager console, any task that you do repeatedly should be
automated using PowerShell. Microsoft best practice is that almost all administration tasks
should be performed remotely rather than by signing in directly to the server and performing
them locally.

Remote not local


Windows Server is designed to be administered remotely rather than locally. This remote first
philosophy shouldn’t come as a surprise to experienced administrators. The vast majority of
Windows Server instances are running as virtual machines, either in datacenters or in the cloud,
and we are long past the days where your primary method of switching between different
servers that you were working on was by selecting different options on a VM switch.
You need to be familiar with how to use your tools remotely. You should avoid signing in
to each server individually using Remote Desktop and firing up the console that is relevant to
the role or feature that you want to manage. You should also avoid using Remote Desktop to
connect to a server just to run a PowerShell script because this is a task more appropriately
performed using PowerShell remoting.

Privileged Access Workstations


Servers are only as secure as the computers that you use to manage them. An increasing
number of security incidents have occurred because a privileged user’s computer was infected
with malware and that computer was then used to perform server administration tasks. Privi-
leged Access Workstations (PAWs) are specially configured computers that you use to perform
remote administration tasks. The idea of a PAW is that you have a computer with a locked-
down configuration that you only use to perform server administration tasks. You don t use this
computer to read your email or browse the internet; you just use it to perform server adminis-
tration tasks.
Consider configuring a PAW in the following way
■ Configure Windows Defender Application Control to allow only specifically authorized
and digitally signed software to run on the computer.
■ Configure Credential Guard to protect credentials stored on the computer.
■ Use BitLocker to encrypt the computer’s storage and protect the boot environment.
■ The computer should not be used to browse the internet or to check email. Server
administrators should have completely separate computers to perform their other

100 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 100 28/06/22 5:45 PM


daily job tasks. Block internet browsing on the PAW both locally and on the perimeter
network firewall.
■ Block the PAW from accessing the internet. Software updates should be obtained from a
dedicated secure update server on the local network. External tools should be obtained
from another computer and transferred to the PAW.
■ Server administrators should not sign in to the PAW using an account that has adminis-
trative privileges on the PAW.
■ Only specific user accounts used by server administrators should be able to sign on
to the PAW. Consider additional restrictions such as sign-in hours. Block privileged
accounts from signing in to computers that are not PAWs or servers to be managed,
such as the IT staff’s everyday work computers.
■ Configure servers to only accept administrator connections from PAWs. This can be
done through Windows Defender Firewall with Advanced Security.
■ Use configuration-management tools to monitor the configuration of the PAW. Some
organizations rebuild PAWs entirely every 24 hours to ensure that configurations are not
altered. Use these tools to restrict local group membership and ensure that the PAW has
all appropriate recent software updates applied.
■ Ensure that audit logs from PAWs are forwarded to a separate secure location.
■ Disable the use of unauthorized storage devices. For example, you can configure poli-
cies so that only US storage devices that have a specific itLocker organizational ID can
be used with the computer.
■ lock unsolicited inbound network traffic to the PAW using Windows Defender Firewall.

Jump servers
Jump servers are another security procedure that can be used in conjunction with privileged-
access workstations. Jump servers allow servers to accept administrative connections only
from specific hosts. For example, you only allow domain controllers to be administered from
computers that have a specific IP address and a computer certificate issued by a specific
certification authority. You can configure jump servers to only accept connections from PAWs
and servers to be administered to only accept connections from jump servers. As mentioned
earlier, some organizations that use jump servers have them rebuilt and redeployed every 24
hours to ensure that their configuration does not drift from the approved configuration. Azure
provides a service, Azure Bastion, that functions as a managed jump server. You’ll learn more
about using Azure Bastion to access Windows Server IaaS VMs in Chapter 3.

Remote Desktop
Remote Desktop is the way that many administrators are likely to remotely perform one-off
tasks on servers running the GUI version of Windows Server. While best practice is to use
PowerShell or Windows Admin Center for remote administration, sometimes it’s quicker to
just establish a Remote Desktop session. This is because using Remote Desktop allows you to

Skill 2.1: Manage Windows Servers in a hybrid environment CHAPTER 2 101

9780137729265_print.indb 101 28/06/22 5:45 PM


perform tasks on the remote server in a manner that appears similar to being directly signed in
at the console.
By default, Remote Desktop is disabled on newly deployed computers running Windows
Server (though this is not the case for new Azure IaaS instances of Windows Server). You enable
Remote Desktop either through the Remote tab of the System Properties dialog box or by run-
ning the following PowerShell command:
Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name
"fDenyTSConnections" –Value 0

You can make Remote Desktop connections to computers running the Server Core installa-
tion option if Remote Desktop is enabled.
By default, Remote Desktop Connection connects to Remote Desktop services on port
3389. When you enable Remote Desktop using the GUI, a remote desktop related firewall
is automatically enabled. If you enable Remote Desktop using PowerShell, you also need
to manually enable a firewall rule to allow connections. You can do this using the following
PowerShell command:
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

By default, the Allow connections only from computers running Remote Desktop with
Network Level Authentication option is selected. Network Level Authentication requires
that a user be authenticated prior to the Remote Desktop session being established. Network
Level Authentication is supported by the Remote Desktop Connection client, which is avail-
able on all Windows operating systems, but it might not be supported by third-party Remote
Desktop clients.
Only users who are members of the local Administrators group and members of the local
Remote Desktop Users group can make connections via Remote Desktop. If you want to grant
a user account permission to access the server without the account full administrative privi-
leges, add the account to the local Remote Desktop Users group.
You can map local volumes to a remote host in an active Remote Desktop Connection ses-
sion by configuring the Local Resources and Devices setting on the Local Resources tab of
the Remote Desktop Connection dialog box. While it is less effective over low-bandwidth
connections, it can provide a simple way to transfer files from your client computer to a remote
server instead of setting up FTP or another file transfer method.

Deploy a WAC gateway server


Windows Admin Center (WAC) is a web-based console that allows you to remotely manage
Windows Server through a web browser. You can connect to and use Windows Admin Center
using Edge, Chrome, or any standards-compliant browser. You can use WAC to manage com-
puters running Windows Server 2012 and later and Windows 10 or later client computers.
You can install WAC on computers running Windows 10 and later and Windows Server 2016
and later. You can install WAC on a Windows Server instance deployed using the Server Core
installation option.

102 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 102 28/06/22 5:45 PM


When you deploy WAC on a Windows Server instance, it functions as a gateway server.
Gateway servers allow any client on the network to connect to the Windows Admin Center
instance using their standards-compliant web browser without requiring Windows Admin
Center be installed locally. A WAC gateway server can function as an administration connection
point for multiple administrative sessions from different administrative users. Some organiza-
tions only deploy a single highly available gateway server and have all WAC administration
tasks performed using that single WAC gateway instance. You should not deploy Windows
Admin Center on a Windows Server instance that hosts the AD DS role.

Installing WAC
Windows Admin Center isn’t included in Windows Server. You have to download the instal-
lation files from the Microsoft website. There are four Windows Admin Center deployment
options:
■ Local client When you choose this installation option, you install Windows Admin
Center on your workstation. You connect to the WAC instance locally, which is similar to
installing the Remote Server Administration Tools (RSAT) on a local workstation. When
you install WAC locally, a shortcut to the WAC console is placed on your desktop.
■ Gateway server When you install WAC in the gateway server configuration, you
install it on a computer running Windows Server 2016 or later and then make remote
connections to the WAC instance hosted on that computer through your preferred
browser. Once connected to the WAC instance, you can add servers that you want
to manage to the web-based console. When you perform an administrative task, the
instructions to perform that task are issued from the gateway server and are run against
the target server.
■ Managed server The managed server deployment is a version of WAC in a gateway
server configuration deployed on a cluster node to manage the cluster.
■ Failover cluster The gateway server is deployed as a highly available service. This
re uires the configuration of a Cluster Shared Volume to store persistent data used by
WAC. A script is available from the Microsoft website that simplifies the process of per-
forming a high availability deployment.
When you install WAC on a Windows Server instance, you get the option of configuring
which port will be used. You can choose between using a self-signed SSL (TLS) certificate or
an SSL (TLS) certificate that is already installed on the computer. If you re deploying a gateway
server, things will be a lot simpler if you deploy a TLS certificate from a trusted CA because it
won’t be necessary to go through the hassle of responding to dialog boxes about whether to
trust the self-signed certificate when connecting to the gateway server from a variety of differ-
ent administrative systems.
You can install Windows Admin Center on a Server Core instance of Windows Server using
msiexec and by specifying the management port and SSL certificate option. (It should be the
TLS certificate since the SSL protocol has been phased out, but most of the world still uses the

Skill 2.1: Manage Windows Servers in a hybrid environment CHAPTER 2 103

9780137729265_print.indb 103 28/06/22 5:45 PM


legacy terminology.) The syntax of the command-line installation where a trusted certificate is
used is as follows:
msiexec /i <WACInstallerName>.msi /qn /L*v log.txt SME_PORT=<port> SME_
THUMBPRINT=<thumbprint> SSL_CERTIFICATE_OPTION=installed

SME_PORT is the port you want to use, and SME_THUMBPRINT is the thumbprint of the
installed SSL (TLS) certificate. y default, installing WAC updates the computer s trusted host
files. When you deploy WAC, you can configure it to update automatically or manually. When
you configure WAC to update automatically, new versions will be installed as they become
available through Microsoft Update. If you don t configure this option, you ll need to manually
install newer versions of WAC as they become available.
To update an expired certificate on a WAC gateway server, you need to obtain and install
the new certificate, obtain the certificate s thumbprint, and then rerun Setup and change the
certificate used by WAC by specifying the new thumbprint.

NEED MORE REVIEW? DEPLOY WAC GATEWAY


You can learn more about deploying a WAC gateway at https://docs.microsoft.com/en-us/
windows-server/manage/windows-admin-center/deploy/install.

Windows Admin Center extensions


Windows Admin Center extensions allow for the extension of WAC functionality. Windows
Admin Center includes extensions for roles built into Windows Server such as Storage Migra-
tion Services and third-party extensions. Microsoft encourages third-party partners to add
extensions to Windows Admin Center as an alternative to requiring systems administrators to
use product-specific consoles.
y default, Windows Admin Center will display extensions published to the Microsoft official
NuGet feed. This feed includes extensions published and updated by Microsoft as well as those
published by trusted third-party vendors. Also, you can configure Windows Admin Center to
display extensions or installations from any NuGet feed that supports the NuGet V2 APIs or a
specially configured file share accessible to the computer hosting Windows Admin Center.
Extensions are available in Windows Admin Center by selecting the Settings icon and then
selecting Extensions. The Available Extension pane displays all extensions that are available
but not installed from the currently configured feed. You can update currently installed exten-
sions if new versions of those extensions are available through the Installed Extensions pane.
You can also configure Windows Admin Center to automatically update extensions.

Show script
When you perform a task in Windows Admin Center, you can select the PowerShell icon in
the Windows Admin Center title bar to view PowerShell source code relevant to the tasks.

104 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 104 28/06/22 5:45 PM


This allows you to copy and save useful PowerShell code for reuse later rather than having to
perform all tasks through WAC.

onfigure a target machine or A


ust like you need to configure a Windows Server instance so that you can connect to it using
Remote Desktop, a Microsoft Management Console, or a remote PowerShell session, you will
also have to configure a Windows Server instance so that it can be managed from a remote
WAC instance.
To allow administration from a WAC instance, Remote Management must be enabled on a
Windows Server instance you intend to manage. WAC traffic from the WAC instance to target
servers uses PowerShell and WMI over WinRM. WinRM connections over HTTP use port 5985
and WinRM connections over HTTPS uses port 5986. If WinRM over HTTPS is not configured,
you can configure a WinRM HTTPS listener using the following command
winrm quickconfig -transport:https

In addition to the WinRM ports, WAC uses the SM file sharing protocol for some file copy-
ing tasks. To configure a target machine for remote management by WAC, you will need to
ensure any firewalls between the WAC instance and the target computer allow inbound con-
nections on ports 445, 5985, and 4986.
To use Windows Admin Center from the Azure portal to manage Windows Server instances
in Azure, it’s necessary to deploy Windows Admin Center to each Windows Server Azure IaaS
instance.

NEED MORE REVIEW? CONFIGURE TARGET MACHINE


You can learn more about configuring a target machine at https://docs.microsoft.com/
windows-server/manage/windows-admin-center/azure/manage-vm.

Manage Azure hybrid services with WAC


Windows Admin Center can also be used to manage Azure hybrid services, such as Azure
Backup, Azure Software Update, Azure Site Recovery, Azure Network Adapter, and Azure
Monitor. Before you can integrate Azure hybrid services with WAC, you need to register the
Windows Admin Center gateway with your Azure subscription. This process requires that you
have access to an Azure AD account with the necessary permissions to configure an Azure AD
application that has access to the Azure AD tenancy associated with your Azure subscription.

onfigure owerShell remoting


PowerShell is the primary scripting, automation, and management tool from Microsoft. In
almost all cases, you can access greater functionality and settings through PowerShell than you
can through WAC or the Azure console.

Skill 2.1: Manage Windows Servers in a hybrid environment CHAPTER 2 105

9780137729265_print.indb 105 28/06/22 5:45 PM


PowerShell includes a substantial amount of documentation explaining what each cmdlet
can do and how you can do it. Once you know the name of the command you want to use to
perform a task, you can use the PowerShell built-in help to learn the precise details of how to
use that cmdlet to perform that task. You can get help for each cmdlet by typing help
cmdletname. For example, to get help with the get-service cmdlet, type help get-service
into a PowerShell session.

Modules
Modules are collections of PowerShell cmdlets. In older versions of PowerShell, you needed
to manually load a module each time you wanted to use one of its associated cmdlets. In
Windows Server 2016 and later, any module that is installed will load automatically when you
try to run an associated cmdlet. Viewing cmdlets by module using the Get-Command-Module
<modulename> cmdlet allows you to view just those cmdlets associated with a specific role or
feature.

PowerShell Gallery
The PowerShell Gallery is a collection of modules published by the community that extend
the functionality of PowerShell beyond what is available with a default installation of Win-
dows Server. Table 2-1 lists the commands that you can use to get started with the PowerShell
Gallery.

TABLE 2-1 PowerShell Gallery basics

Command Functionality

Find-Module -Repository This will list the available modules in the PowerShell Gallery in a
PSGallery | out-host -paging paged format. You’ll be prompted to install the NuGetProvider to
interact with the PowerShell Gallery.

Find-Module -Repository This will list the modules with a specific name. You can use wild-
PSGallery -Name <ModuleName> cards. For example, to view all modules that start with the name
AzureRM, run the command Find-Module -Repository
PSGallery -Name AzureRM*.

Install-Module -Repository This will install the Modulename module. For example, to install the
PSGallery -Name <ModuleName> AzureRM module, run the command Install-Module
-Repository PSGallery -Name AzureRM.

Update-Module This will update any module that you’ve installed using
Install-Module.

Get-InstalledModule Use this command to view all modules installed from the Power-
Shell Gallery.

PowerShell remoting
PowerShell remoting allows you to establish a remote interactive PowerShell session from a
local PowerShell session on an administrative workstation or Cloud Shell. By default, Power-
Shell remoting is enabled on Windows Server instances but also requires a connection from a

106 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 106 28/06/22 5:45 PM


private network and an account that is a member of the local Administrators group. PowerShell
uses WMI over WinRM. WinRM connections over HTTP use port 5985, and WinRM connections
over HTTPS uses port 5986. If PowerShell remoting has been disabled, you can enable it using
the Enable-PSRemoting cmdlet. If WinRM over HTTPS is not configured, you can configure a
WinRM HTTPS listener using the following command:
winrm quickconfig -transport:https

You initiate a remote PowerShell session using the enter-pssession command. If you do
not specify alternate credentials, the credentials of the currently signed-on user will be used.
If you want to use alternate credentials, one method to do so securely is by using the get-
credential command and assigning it to a PowerShell variable, and then using the variable
with the enter-pssession command. When you use get-credential, you will be prompted
to enter a set of credentials. For example, to enter a set of credentials and then to use those
credentials to establish a remote PowerShell session to a host named dc1.tailwindtraders.com,
use the following commands:
$creds = get-credential
Enter-pssession -Computername dc1.tailwindtraders.com -credential $creds

To enable PowerShell remoting to computers that are not domain-joined, you must config-
ure the trusted hosts list on the client computer from which you want to establish the remote
session. You do this on the client computer using the set-item cmdlet. For example, to trust
the computer at IP address 192.168.3.200, run this command:
Set-Item wsman:\localhost\Client\TrustedHosts -Value 192.168.3.200 -Concatenate

Once you ve run the command to configure the client, you ll be able to establish a Power-
Shell remote session using the Enter-PSSession cmdlet. If you want more information about
remoting, run the following command to bring up help text on the subject:
Help about_Remote_faq -ShowWindow

PowerShell allows you to run one command against many machines, which is known as one-
to-many remoting or fan-out administration. You can use one-to-many remoting to run the
same command against any number of computers. Rather than signing in to each computer to
check whether a particular service is running, you can use PowerShell remoting to run the same
command that checks the status of the service against each computer within the scope of the
command.
For example, you could use the following command to read a list of computers from a text
file named computers.txt
$Computers = Get-Content c:\Computers.txt

You could then use the following command to get the properties of the Windows Update
service:
Invoke-Command -ScriptBlock { get-service wuauserv } -computername $Computers

Skill 2.1: Manage Windows Servers in a hybrid environment CHAPTER 2 107

9780137729265_print.indb 107 28/06/22 5:45 PM


You can also use the Invoke-Command cmdlet to run a script from the local computer
against a number of remote computers. For example, to run the script FixStuff.ps1 against the
computers in the file computers.txt, run this command
$Computers = Get-Content c:\Computers.txt
Invoke-Command -FilePath c:\FixStuff.ps1

NEED MORE REVIEW? POWERSHELL REMOTING


You can learn more about PowerShell remoting at https://docs.microsoft.com/powershell/
scripting/learn/remoting/powershell-remoting-faq.

onfigure re SS or erberos Delegation or secon


hop remoting
Second hop remoting is when you are signed in to one host, make a remote PowerShell con-
nection to a second host, and perform a task that requires resource access to a third host that
requires your account credentials. Unless the second host has a way of forwarding your cre-
dentials to the third host, the task may not complete because your credentials can’t be used for
that task. The process of a server acting on behalf of a signed-on user is termed delegation.
erberos delegation allows a computer to interact with the erberos ey Distribution
Center to obtain a service ticket derived from the user’s permissions that is used to access
resources on the network.
For example, say you need to allow users with accounts in the tailwindtraders.com domain
to use a WAC to manage a server named app1.adatum.com in the adatum.com domain. The
following conditions exist:
■ You have deployed a WAC gateway server on host wac.tailwindraders.com.
■ There is a two-way forest trust between the adatum.com and the tailwindtraders.com
single-domain forests.
You can configure constrained delegation in this scenario by running the following
PowerShell command:
Set-ADComputer -Identity (Get-ADComputer wac.tailwindtraders.com) -PrincipalsAllowed
ToDelegateToAccount (Get-ADComputer app1.adatum.com)

erberos constrained delegation allows you to limit which of a computer s services can
interact with the DC to obtain the appropriate ticket on the user s behalf. You can configure
constrained delegation on the Delegation tab of a computer account’s properties in Active
Directory Users and Computers. When you do this, you specify the service type, the user or
computer account that can leverage delegated credentials, the port, and the service principal
name of the service that can perform the action.

108 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 108 28/06/22 5:45 PM


NEED MORE REVIEW? SECOND HOP REMOTING
You can learn more about second hop remoting at https://docs.microsoft.com/powershell/
scripting/learn/remoting/ps-remoting-second-hop.

onfigure ust nough A ministration or owerShell


remoting
Just Enough Administration (JEA) allows you to implement role-based access control (RBAC)
functionality through Windows PowerShell remoting. JEA allows you to specify which Power-
Shell cmdlets and functions can be used when connected to a specific endpoint. You can go
further and specify which parameters within those cmdlets and functions are authorized and
even specify which values can be used with those parameters.
For example, you could create a JEA endpoint where a user is able to run the Restart-
Service command, but only where the Name parameter is set to DHCPServer. This would
allow the user to restart the DHCPServer on the computer they connected to, but it would not
restart any other service on the computer.
You can also configure a EA endpoint to allow other command-line commands such as
whoami to be run, though the drawback of this is that you don’t have the same level of control
when restricting how that command can be run.
JEA endpoints can leverage virtual accounts. This means that activities performed on the
computer through the endpoint use a special temporary virtual account rather than the user’s
account. This temporary virtual account has local administrator privileges but is constrained to
only using the cmdlets, functions, parameters, and values defined by EA. The benefits of this
include:
■ The user’s credentials are not stored on the remote system. If the remote system is com-
promised, the user’s credentials are not subject to credential theft and cannot be used
to traverse the network to gain access to other hosts.
■ The user account used to connect to the endpoint does not need to be privileged.
The endpoint simply needs to be configured to allow connections from specified user
accounts.
■ The virtual account is limited to the system on which it is hosted. The virtual account
cannot be used to connect to remote systems. Attackers cannot use a compromised
virtual account to access other protected servers.
■ The virtual account has local administrator privileges but is limited to performing only
the activities defined by EA. You have the option of configuring the virtual account
with the membership of a group other than the local administrators group, to further
reduce privileges.

Skill 2.1: Manage Windows Servers in a hybrid environment CHAPTER 2 109

9780137729265_print.indb 109 28/06/22 5:45 PM


ole capabilit files
A role-capability file is a special file that allows you to specify what tasks can be performed
when connected to a JEA endpoint. Only tasks that are explicitly allowed in the role-capability
file can be performed.
You can create a new blank role-capability file by using the New-PSRoleCapabilityFile
cmdlet. Role-capability files use the .psrc extension. For example, run this command to create a
new role-capability file for a role that allows someone to manage a DNS server
New-PSRoleCapabilityFile -Path .\DNSOps.psrc

Once the PSRC file is created, you edit the role-capability file and add the cmdlets, func-
tions, and external commands that are available when a user is connected to the endpoint.
You can allow entire Windows PowerShell cmdlets or functions or list which parameters and
parameter values can be used.
You can edit a role-capability file in PowerShell ISE, Visual Studio Code (though only the first
is available on Windows Server), or any capable text editor. Editing the file involves comment-
ing out the appropriate sections and filling them in with the configuration items that you want
to set.
Authoring role-capability files is one of those few times when you need to know whether
something in PowerShell is a cmdlet or a function. Mostly, people refer to commands in
PowerShell as cmdlets, but some are actually functions and others are aliases. You need
to know the appropriate type when configuring a role-capability file because if you put a
function in as an allowed cmdlet, you won t get the expected result. You can figure out which
designation is appropriate by using the Get-Command cmdlet.
Table 2-2 describes the different options that you can configure in a role-capability file.

TABLE 2-2 Role-capability files

Capability Description

ModulesToImport JEA auto-loads standard modules, so you probably don’t need to use this unless you
need to import custom modules.

VisibleAliases Specifies which aliases to make available in the EA session. Even if an aliased cmdlet is
available, the alias won’t be available unless it’s here.

VisibleCmdlets Lists which Windows PowerShell cmdlets are available in the session. You can extend
this by allowing all parameters and parameter values to be used or you can limit cmd-
lets to particular parameters and parameter values. For example, use the following
syntax, if you wanted to allow the Restart-Service cmdlet to only be used to restart
the DNS service:
VisibleCmdlets = @{ Name = 'Restart-Service'; Parameters = @{
Name='Name'; ValidateSet = 'DNS'}}

110 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 110 28/06/22 5:45 PM


Capability Description

VisibleFunctions This field lists which Windows PowerShell functions are available in the session. You
can choose to list functions, allowing all parameters and parameter values to be used,
or you can limit functions to particular parameters and parameter values. For example,
if you wanted to allow the Add-DNSServerResourceRecord, Get-DNSServer
ResourceRecord, and Remove-DNSServerResource functions to be used, you would
use the following syntax:
VisibleFunctions = 'Add-DNSServerResourceRecord',
'Get-DNSServerResourceRecord','Remove-DNSServerResourceRecord'

VisibleExternal This field allows users who are connected to the session to run external commands. For
Commands example, you can use this field to allow access to c:\windows\system32\whoami.exe so
that users connected to the JEA session can identify their security context by using the
following syntax:
VisibleExternalCommands = 'C:\Windows\System32\whoami.exe'

VisibleProviders This field lists Windows PowerShell providers that are visible to the session.

ScriptsToProcess This field allows you to configure Windows PowerShell scripts to run automatically
when the session is started.

AliasDefinitions This field allows you to define Windows PowerShell aliases for the EA session.

FunctionDefinitions This field allows you to define Windows PowerShell functions for the EA session.

VariableDefinitions This field allows you to define Windows PowerShell variables for the EA session.

EnvironmentVariables This field allows you to specify environment variables for the EA session.

TypesToProcess This field allows you to configure Windows PowerShell type files to load for the EA
session.

FormatsToProcess This field allows you to configure Windows PowerShell formats to load for the EA
session.

AssembliesToLoad This field allows you to specify which assemblies to load for the EA session.

Session configuration files


Session-configuration files determine which role capabilities are mapped to specific security
groups. For example, if you wanted to allow only members of the CONTOS\DNSOps security
group to connect to the EA endpoint that is defined by the DNSOps role-capability file, you
would configure this security group in the session-configuration file.
You use the New-PSSessionConfigurationFile cmdlet to create a session-configuration
file. These files use the .pssc extension. For example, to create a new session-configuration file
for the DNSOps role, run the following command:
New-PSSessionConfigurationFile -Path .\DNSOps.pssc -Full

Session-configuration files have elements described in Table 2-3.

Skill 2.1: Manage Windows Servers in a hybrid environment CHAPTER 2 111

9780137729265_print.indb 111 28/06/22 5:45 PM


TABLE 2-3 Session-configuration files

Field Explanation

SessionType This field allows you to configure the session s default settings. If you set this to
RestrictedRemoteServer, you can use the Get-Command, Get-FormatData,
Select-Object, Get-Help, Measure-Object, Exit-PSSession, Clear-Host, and
Out-Default cmdlets. The session execution policy is set to RemoteSigned.
Example:
SessionType = 'RestrictedRemoteServer'

RoleDefinitions You use the RoleDefinitions entry to assign role capabilities to specific security
groups. These groups do not need to have any privileges and can be standard secu-
rity groups.
Example:
RoleDefinitions =@{'CONTOSO\DNSOps' = @{RoleCapabilities='DNSOps'}}

RunAsVirtualAccount When enabled, this field allows EA to use a privileged virtual account created just
for the JEA session. This virtual account has local administrator privileges on mem-
ber servers and is a member of the Domain Admins group on a domain controller.
Use this option to ensure that credentials are not cached on the server that hosts the
endpoint. Remember that you can configure the virtual account to be a member of
groups other than the local administrators group.

TranscriptDirectory This field allows you to specify the location where EA activity transcripts are stored.

RunAsVirtual If you do not want the virtual account to be a member of the local administrators
AccountGroups group (or Domain Admins on a domain controller), you can instead use this field to
specify the groups in which the virtual account is a member.

JEA endpoints
A EA endpoint is a Windows PowerShell endpoint that you configure so that only specific
authenticated users can connect to it. When those users do connect, they only have access to
the Windows PowerShell cmdlets, parameters, and values defined by the appropriate session-
configuration file that links security groups and role capabilities. When you use endpoints with
virtual accounts, the actual activity that a user performs on the server that hosts the endpoint
occurs using the virtual account. This means that no domain-based administrative credentials
are stored on the server that hosts the endpoint.
A server can have multiple JEA endpoints, and each JEA endpoint can be used for a dif-
ferent administrative task. For example, you could have a DNSOps endpoint to perform DNS
administrative tasks and an IISOps endpoint to perform Internet Information Server–related
administrative tasks. Users are not required to have privileged accounts that are members of
groups, such as the local administrators group, to connect to an endpoint. Once connected, users
have the privileges assigned to the virtual account configured in the session-configuration file.

112 CHAPTER 2 Manage Windows Servers and workloads in a hybrid environment

9780137729265_print.indb 112 28/06/22 5:45 PM


You create JEA endpoints by using the Register-PSSessionConfiguration cmdlet. When
using this cmdlet, you specify an endpoint name and a session-configuration file hosted on the
local machine.
For example, to create the endpoint DNSOps using the DNSOps.pssc session-configuration
file, issue the following command and then restart the WinRM service
Register-PSSessionConfiguration -Name DNSOps -Path .\DNSOps.pssc

You can use the Get-PSSessionConfigurationFile cmdlet to determine which endpoints


are present on a computer. A user wanting to connect to a JEA session endpoint uses the
Enter-PSSession cmdlet with the ConfigurationName parameter. For example, to connect to
the DNSOps JEA endpoint on server MEL-DNS1, you would use this command:
Enter-PSSession -ComputerName MEL-DNS1 -ConfigurationName DNSOps

Once you ve verified that EA works, you ll need to lock down the default PowerShell end-
point. By default, only members of the local administrators group can connect to this default
endpoint, and if you’ve implemented JEA properly, this group shouldn’t need to have very
many members anyway.

NEED MORE REVIEW? JUST ENOUGH ADMINISTRATION


You can learn more about Just Enough Administration at https://docs.microsoft.com/
powershell/scripting/learn/remoting/jea/overview
powershell/scripting/learn/remoting/jea/overview.

EXAM TIP
emember which owerShell cm lets are rele ant to specific A tas s

Skill 2.2: Manage Windows Servers and workloads by


using Azure Services
This objective deals with managing Windows Server instances in hybrid environments using
Azure services, including Azure Arc, Microsoft Defender for Cloud, Microsoft Update, and
Desired State Configuration.

Skill 2.2: Manage Windows Servers and workloads by using Azure Services CHAPTER 2 113

9780137729265_print.indb 113 28/06/22 5:45 PM


Index

A
access-denied assistance, 247 DSRM (Directory Services Restore Mode), 7–8
Active Directory Domains and Trusts, 6 forests, 16
Active Directory Federation Services, 74 Group Policy, 83. See also AGPM (Advanced Group
Active Directory Recycle Bin, 12–13 Policy Management); Group Policy
Active Directory Sites and Services, 6 Administrative template, 92–93
Active Directory Users and Computers, 5 caching, 91
Delegation of Control Wizard, 5 fixing GPO problems, 85–86
tasks, 5 forced update, 91–92
View Advanced Features function, 5 GPO backup, 84–85
Active Directory-integrated zones, 186–187 GPO management, 83–85, 86
AD DS (Active Directory Domain Services), 1, 9. See also implementing, 95
Azure AD; domain(s) import and copy GPOs, 85
backup, 10 loopback processing, 90–91
database optimization, 20–21 preferences, 93–94
DNS integration, 186, 188, 192 security filtering, 89–90
Active Directory-integrated zones, 186–187 WMI filters, 90
alias (CNAME) records, 191 groups, 47
conditional forwarders, 193 integration with other AD instances, 71
forwarders, 192–193 metadata cleanup, 21
GlobalNames zones, 189–190 multi-domain forests, 17–18
host records, 190 partitions, 41
MX (mail exchanger) records, 191 password(s)
pointer records, 191 managing, 74–75
resource records, 190, 194–195 policy items, 75
reverse lookup zones, 188–189 replication, 24–25
scavenging, 192 settings permissions, 76
secondary zones, 188 replication, 41
stub zones, 193 conflict resolution, 43
unknown records, 191 KCC (Knowledge Consistency Checker), 42
zone aging, 191–192 managing and monitoring, 44
zone delegation, 190 multi-master, 42
domain(s), 16–17 RODC, 43–44
authentication and, 18 store and forward, 42
controllers, 1–2, 6–7 triggering, 44
forests and, 19–20 security, 45
functional levels, 19 site(s), 35–37
trees and, 18 creating, 37–38
link bridges, 40

269

Z01_Thomas_index_p269-286.indd 269 01/07/22 2:30 PM


Azure AD; domain(s)

links, 39–40 authoritative restore, 13–15


subnets, 38 Azure AD, 1, 2. See also domain controllers
snapshots, 22 Application Proxy, 229–230
tombstone lifetime, 10–12 Connect Health, 72
trust(s), 29, 30 deleted items, restoring, 15
direction, 30–31 Active Directory Recycle Bin, 12–13
external, 32 AD DS (Active Directory Domain Services), 10
forest, 31–32 authoritative restore, 13–15
name suffix routing, 35 non-authoritative restore, 15
netdom.exe and, 34 integration with other AD instances, 71
realm, 33 managing, 2–3
shortcut, 32 using Active Directory Domains and Trusts, 6
SID filtering, 34–35 using AD sites and Services, 6
transitivity, 30 using AD Users and Computers, 5
ADAC (Active Directory Administrative Center), 3 using ADAC (Active Directory Administrative
Powershell and, 3 Center), 3–4
search functionality, 3–4 Password Protection, 82
Add-Clusternode cmdlet, 257 Azure AD Connect, 54–55
Add-Computer cmdlet, 52 cloud sync, 67
Add-DhcpServer4Filter cmdlet, 209 installing, 58–63
Add-DHCPServer4Scope cmdlet, 205 requirements, 56–57
Add-DHCPServer6Scope cmdlet, 205 deployment account, 57–58
Add-DhcpServerv4SuperScope cmdlet, 206 SQL Server, 57
Add-DNSPrimaryZone cmdlet, 189 synchronization, 65–67
Add-DnsServerConditionalForwarderZone cmdlet, 193 Azure AD DS
Add-DNSServerDirectoryPartition cmdlet, 187 deploying, 68–70
Add-DnsServerPrimaryZone cmdlet, 187 domain join, 70
Add-DNSServerQueryResolutionPolicy cmdlet, 199 integration with other AD instances, 71
Add-DNSServerSecondaryZone cmdlet, 188 managing, 68
Add-DnsServerStubZone cmdlet, 193 Azure App Service Hybrid Connections, 230–231
Add-DnsServerZoneDelegation cmdlet, 190 Azure Arc, 114
ADDomainMode cmdlet, 19 connecting to Windows Server instances, 115–116
Add-VMAssignableDevice cmdlet, 134 deployment, 115–116
administration tools, Windows Server, 100 functionality, 114–115
jump servers, 101 Azure Automation
PAWs (Privileged Access Workstations), 100–101 Hybrid Runbook Worker, 123–124
remote access and, 100 runbooks, 123
Remote Desktop, 101–102 State Configuration, 124
WAC (Windows Admin Center), 102–105 Azure Bastion, connecting to IaaS VMs, 178
AGPM (Advanced Group Policy Management), 88–89 Azure DNS, integrating with Windows Servers DNS,
alias (CNAME) records, 191 193–194
ARM (Azure Resource Manager), templates, 53 Azure ExpressRoute, 228–229
assessment, Windows update compliance, 119 Azure Extended Network, 219–220
authentication Azure File Sync, 233
intra-forest, 18 cloud endpoints, creating, 235
NPS and, 223 cloud tiering, 237
pass-through, 74 migrating DFS to, 234–239
on-premises environments and, 73 monitoring, 234–238
VPN, 213–214 server endpoints, creating, 236

270

Z01_Thomas_index_p269-286.indd 270 01/07/22 2:30 PM


computer accounts

server registration, 235–236 Add-DNSServerQueryResolutionPolicy, 199


storage sync service, deploying, 234 Add-DNSServerSecondaryZone, 188
sync groups, creating, 234–235 Add-DnsServerStubZone, 193
Azure Monitor, 120 Add-DnsServerZoneDelegation, 190
agent, 121 ADDomainMode, 19
Azure File Sync and, 234–238 Add-VMAssignableDevice, 134
data collection, 120 checkpoint-related, 136–137
installing, 121 DNSServerCache, 197
Log Analytics workspace, 120 Enable-PSRemoting, 106–107, 129
Azure Network Adapter, 219 Enter-PSSession, 107, 129, 130
Azure Policy guest configuration, 116–117 Get-ADTrust, 34
Azure Relay, 227–228 Get-Command-Module <modulename>, 106
Azure Serial Console, connecting to IaaS VMs, 179 Get-NetAdapter, 131
Azure Virtual WAN, 229 Get-PSSessionConfigurationFile, 113
Get-SRPartnership, 260
Get-StoragePool, 254

B getting help with, 106


GPO management, 84
backup and restore, 10–12 Install-ADDSForest, 9
Active Directory Recycle Bin, 12–13 Install-ADServiceAccount, 49
AD DS (Active Directory Domain Services), 10 Invoke-Command, 108
authoritative restore, 13–15 Move-ADDirectoryServer, 40
checkpoints and, 137 New-ADDCCloneConfig, 16
GPOs, 84–85 New-ADReplicationSiteLink, 40
non-authoritative restore, 15 New-ADReplicationSubnet, 38
bandwidth management, Hyper-V, 155 New-AzADServicePrincipal, 115–116
basic disks, 252 New-NetNAT, 131
BranchCache, 247–248 New-StorageQosPolicy, 262
New-VMSwitch, 131
Register-PSSessionConfiguration, 113
Set-ADComputer, 50
C Set-ADForestMode, 20
Set-ADObject, 9
checkpoints, 136–137, 153
Set-DhcpServerv4DnsSetting, 207
cloning, virtual domain controllers, 16
Set-PhysicalDisk, 254
cloud endpoints, creating, 235
Set-SRPartnership, 260
Cloud Shell, 122
Test-SRTopology, 259
cloud sync, 67
Uninstall-ADDSDomainController, 21
cloud tiering, 237
commands
cmdlets, 3
Docker, 160
Add-Clusternode, 257
docker load, 166
Add-Computer, 52
docker rmi, 166
Add-DhcpServer4Filter, 209
docker run, 167, 169
Add-DHCPServer4Scope, 205
docker save, 166
Add-DHCPServer6Scope, 205
docker tag, 166
Add-DhcpServerv4SuperScope, 206
get-credential, 107
Add-DNSPrimaryZone, 189
netdom trust, 34
Add-DnsServerConditionalForwarderZone, 193
compliance, Windows update, 119
Add-DNSServerDirectoryPartition, 187
computer accounts, 47
Add-DnsServerPrimaryZone, 187

271

Z01_Thomas_index_p269-286.indd 271 01/07/22 2:30 PM


conditional forwarders

conditional forwarders, 193 network policies, 225–227


conflict resolution, 43 shared folders, 240
connection request policies, 220 site links, 39–40
creating, 224 sites, 37–38
default, 223–224 sync groups, 234–235
Realm and RADIUS attributes, 223 CSVs (Cluster Shared Volumes), 143
consoles, 2–3
Active Directory Domains and Trusts, 6
Active Directory Sites and Services, 6
Active Directory Users and Computers, 5 D
Delegation of Control Wizard, 5 DANE (DNS-based Authentication of Named Entities),
tasks, 5 198
View Advanced Features function, 5 data disks, 174
ADAC (Active Directory Administrative Center), 3 DDA (Discrete Device Assignment), 133–134
Powershell and, 3 decommissioning RODCs, 26–27
search functionality, 3–4 deduplication, 152, 260–261
constrained delegation, 108 defragmentation, Active Directory database, 20–21
container(s), 158. See also Docker delegation, 108
host, 159 Delegation of Control Wizard, Active Directory Users
Hyper-V isolation, 160 and Computers, 5
image dependency, 159 deployment
images, 158–159 Azure Arc, 115–116
creating, 171–172 domain controller, 6–7
managing, 166 global catalog servers, 9–10
updating, 165–166 Server Core, 8–9
Windows Server, 163–164 virtualized, 9
instance, 159, 167–168 IPAM, 200
modifying, 168 Windows updates, 118–119
networking, 168–169 detached clusters, 143–144
Layer 2 Bridge mode, 171 DFS (Distributed File System), 248
NAT, 169–170 namespace, 249–250
transparent mode, 170 replication, 234–239, 250
process isolation, 160 groups, 250–251
registries, 159, 163 replicated folders and targets, 250
sandbox, 159 schedules, 251
Windows, service accounts, 164–165 DHCP (Dynamic Host Configuration Protocol)
continuous delivery, IaaS VMs and, 176 failover, 209
copying, VMs, 153 filtering, 208–209
core scheduler, Hyper-V, 135–136 name protection, 207
CPU groups, 135 policies, 208
creating relay, 207–208
Azure File Sync endpoints, 236 scopes, 204–206
cloud endpoints, 235 multicast, 206
connection request policies, 224 split, 207
container images super, 206
from a container, 171 server options, 205–206
using Dockerfiles, 171–172 server role, deploying, 203–204
container instance, 167–168 differencing disks, 149
GPOs, 86–87 DirectAccess, 216

272

Z01_Thomas_index_p269-286.indd 272 01/07/22 2:30 PM


Dynamic Virtual Machine Queue

NLS (Network Location Server), 218–219 docker save command, 166


server, 217–218 docker tag command, 166
topologies, 216–217 Dockerfiles, 171–172
Directory Services Restore Mode, authoritative restore, domain controllers, 1–2
14–15 deploying, 6–7
disks. See also storage domain names and, 6–7
basic, 252 FMSO roles, 26–27
dynamic, 252 domain naming master, 27
partitions, 252 infrastructure master, 28
thin-provisioned, 254–255 PDC emulator, 28
DNS (Domain Name System), 186, 188, 192. See also IPAM RID master, 28
cache locking, 197 schema master, 27
conditional forwarders, 193 seizing, 29
DANE (DNS-based Authentication of Named global catalog servers, 9–10
Entities), 198 installing, from media, 8
forwarders, 192–193 KCC (Knowledge Consistency Checker), 42
netmask ordering, 197 moving, 40
policies, 199 physical security, 24
records read-only, 24
alias (CNAME), 191 decommissioning, 26–27
host, 190 local administrators, 26
MX (mail exchanger), 191 password replication, 24–25
pointer, 191 replication, 43–44
resource, 190, 194–195 Server Core deployment, 8–9
unknown, 191 USNs (update sequence numbers), 43
recursion, 197 virtual, 9, 16, 23
response rate limiting, 198 domain local groups, 48
scavenging, 192 domain(s), 16–17
socket pool, 196 computer accounts and, 47
spoofing, 196 forests, 17–18, 19–20
Windows Server, event logs, 196 functional levels, 19
zone(s) joining, 70
Active Directory-integrated, 186–187 trees, 17, 18
aging, 191–192 trust(s), 30
delegation, 190 direction, 30–31
GlobalNames, 189–190 external, 32
reverse lookup, 188–189 forest, 31–32
secondary, 188 name suffix routing, 35
stub, 193 netdom.exe and, 34
DNSSEC (Domain Name System Security Extensions), realm, 33
194–195 shortcut, 32
DNSServerCache cmdlet, 197 SID filtering, 34–35
Docker, 160 transitivity, 29
commands, 160 DSC (Desired State Configuration), 124
daemon.json file, 161–163 dynamic
installing, 160–161 disks, 252
docker load command, 166 memory, 131, 132
docker rmi command, 166 quorum, 142
docker run command, 167, 169 Dynamic Virtual Machine Queue, 156

273

Z01_Thomas_index_p269-286.indd 273 01/07/22 2:30 PM


editing, GPOs

E filesystems
FAT/FAT32, 265
editing, GPOs, 87 NTFS, 263–264
Enable-PSRemoting cmdlet, 106–107, 129 ReFS, 264–265
encryption fine-grained password policies, 76–77
IaaS VMs, 175 FMSO roles, 26–27
NPS and, 224–225 domain naming master, 27
endpoints infrastructure master, 28
Azure File Sync, creating, 236 PDC emulator, 28
cloud, 235 RID master, 28
JEA, 109, 112–113 seizing, 29
Enhanced Session Mode, 130 forests, 16, 19–20
Enter-PSSession cmdlet, 107, 129, 130 authentication and, 18
ESAE (Enhanced Security Administrative Environment), ESAE (Enhanced Security Administrative Environ-
forests, 20 ment), 20
event logs, DNS, 196 multi-domain, 17–18
exporting, VMs, 153 trusts and, 31–32
extensions forwarders, 192–193
Azure VM, 117–118 FSRM (File Server Resource Manager)
Extended Network, 220 access-denied assistance, 247
WAC (Windows Admin Center), 104 file classification, 245–246
external switches, 157 file management tasks, 246
external trusts, 32 quotas, 243–244
storage reports, 244–245

F
failover
G
clustering, 140 gateway server, 103
Active Directory detached clusters, 143–144 Generation 2 VMs, 128–129
cluster networking, 142–143 Get-ADTrust cmdlet, 34
cluster node weight, 142 Get-Command-Module <modulename> cmdlet, 106
cluster quorum, 141 get-credential command, 107
Cluster Shared Volumes, 143 Get-NetAdapter cmdlet, 131
dynamic quorum, 142 Get-PSSessionConfigurationFile cmdlet, 113
Force Quorum Resiliency, 143 Get-SRPartnership cmdlet, 260
guest clusters, 145–147 Get-StoragePool cmdlet, 254
host cluster storage, 140 global catalog servers, 9–10
preferred owner and failover settings, 144 global groups, 48
VM drain on shutdown, 144–145 GlobalNames zones, 189–190
VM Network Health Detection, 144 GMSAs (group managed service accounts), 48, 49–50,
DHCP, 209 164–165
replica, 139–140 GPMC (Group Policy Management Console), 83–85
fan-out administration, 107 Group Policy, 83, 95, 247. See also AGPM (Advanced
FAT/FAT32, 265 Group Policy Management)
file classification, 245–246 Administrative template, 92–93
file screen(s), 241 caching, 91
file groups and, 241–242 DNSSEC and, 195
templates, 243 forced update, 91–92

274

Z01_Thomas_index_p269-286.indd 274 01/07/22 2:30 PM


Hyper-V

GPOs configuring VM replicas, 138–139


backing up, 84–85 replica failover, 139–140
creating, 86–87 host records, 190
editing, 87 HVC.exe, VM management, 130
import and copy, 85 hybrid workloads, Azure Automation and, 123–124
linking, 87 Hyper-V, 127, 128
managing, 83–85, 86 checkpoints, 136–137
troubleshooting, 85–86 CPU groups, 135
loopback processing, 90–91 Enhanced Session Mode, 130
Modeling Wizard, 87 failover clusters, 140
policy enforcement and blocking, 88–89 Active Directory detached clusters, 143–144
preferences, 93–94 cluster networking, 142–143
Results, 88 cluster node weight, 142
security filtering, 89–90 cluster quorum, 141
WMI filters, 88, 90 Cluster Shared Volumes, 143
groups, 47 dynamic quorum, 142
domain local, 48 Force Quorum Resiliency, 143
global, 48 host cluster storage, 140
universal, 47 preferred owner and failover settings, 144
guest clusters, 145 VM drain on shutdown, 144–145
shared virtual hard disk, 146 VM Network Health Detection, 144
storage, 145–146 guest clusters, 145
VHD Sets, 147 shared virtual hard disk, 146
storage, 145–146
VHD Sets, 147

H integration services, 133


isolation, 160
high availability live migration, 147–148
DHCP, 209 nested virtualization, 130–131
Hyper-V failover clusters, 140 dynamic memory, 131
Active Directory detached clusters, 143–144 networking, 131
cluster networking, 142–143 network adapter
cluster node weight, 142 network isolation, 155
cluster quorum, 141 NIC teaming, 156
Cluster Shared Volumes, 143 VM MAC address and, 154–155
dynamic quorum, 142 optimizing network performance, 155
Force Quorum Resiliency, 143 bandwidth management, 155
host cluster storage, 140 Dynamic Virtual Machine Queue, 156
preferred owner and failover settings, 144 SR-IOV, 155–156
VM drain on shutdown, 144–145 Replica, 137–138
VM Network Health Detection, 144 Broker, 139–140
Hyper-V guest clusters, 145 configuring replica servers, 138
shared virtual hard disk, 146 configuring VM replicas, 138–139
storage, 145–146 failover, 139–140
VHD Sets, 147 scheduling types, 135–136
Hyper-V live migration, 147–148 smart paging, 132–133
Hyper-V Replica, 137–138 storage optimization
Broker, 139–140 deduplication, 152
configuring replica servers, 138 storage migration, 152–153
storage tiering, 152

275

Z01_Thomas_index_p269-286.indd 275 01/07/22 2:30 PM


Hyper-V

virtual hard disks domain controllers, 8


differencing disks, 149 WAC (Windows Admin Center), 103–104
dynamically expanding disks, 149 integration services, 133
fixed-size disks, 149 internal switches, 157
formats, 148 intra-forest authentication, 18
modifying, 150 Invoke-Command cmdlet, 108
pass-through disks, 150–151 IP addressing
Storage QoS, 151 IaaS VMs and, 180–181
Virtual Fibre Channel adapters, 151 reservations, 208
virtual switches, 156 troubleshooting, 204
external, 157 IPAM, 200
internal, 157 administration, 201–202
private, 157 deployment, 200
IP address
space management, 202

I tracking, 202–203
server discovery, 201
IaaS VMs, 173 IPsec, 215
configuring continuous delivery, 176
connecting
with Azure AD account, 176–177
JIT access, 178
J
with Remote PowerShell, 177–178 JEA (Just Enough Administration), 109
using Azure Bastion, 178 endpoints, 112–113
using Azure Serial Console, 179 role-capability files, 110–111
using Windows Admin Center, 178 session-configuration files, 111–112
data disks, 174 JIT (Just-in-Time) VM access, 178
encryption, 175 joining
images, 174 domains, 70
IP addressing, 180–181 Windows Server to an Active Directory instance,
managing, 122–123 52–53
NSGs and, 181 jump servers, 101
RBAC roles, 173–174
resizing, 175–176
shared disks, 174
snapshots, 175
K
virtual networks, 179–180, 181 KCC (Knowledge Consistency Checker), 42
identities, hybrid, 54 Kerberos
IKEv2, 214–215 delegation, 50, 108
importing, VMs, 153 policies, 51–52
inactive accounts, 82 SPNs (service principal names), 52
infrastructure master, 28
Install-ADDSForest cmdlet, 9
Install-ADServiceAccount cmdlet, 49
installing L
Azure AD Connect, 58–63 L2TP, 215
Azure Monitor, 121 LAN routing, 215
BranchCache, 247 Layer 2 Bridge networks, 171
Docker, 160–161

276

Z01_Thomas_index_p269-286.indd 276 01/07/22 2:30 PM


NPS (Network Policy Server)

linking GPOs, 87 moving, domain controllers, 40


Linux multi-domain forests, 17–18
integration services, 133 multi-master replication, 42
VMs (virtual machines), HVC.exe and, 130 MX (mail exchanger) records, 191
live migration, 147–148
local administrators, RODC, 26
Local Service (NT AUTHORITY\LocalService) account, 48
Local System (NT AUTHORITY\SYSTEM) account, 48
N
lockout policies, 79, 81 name suffix routing, 35
Log Analytics, integrating with Windows Servers, NAT (network address translation), 169–170, 216
120–121 nested resiliency, 256
nested virtualization, 130–131
dynamic memory, 131

M networking, 131
netdom trust command, 34
MAC address, VM, 153–154 netdom.exe, 34
managing. See also administration tools network adapters, Hyper-V
AD DS passwords, 74–75 network isolation, 155
Azure AD, 2–3 NIC teaming, 156
using Active Directory Domains and Trusts, 6 VM MAC address and, 153–154
using AD sites and Services, 6 Network Service (NT AUTHORITY\NetworkService)
using AD Users and Computers, 5 account, 49
using ADAC (Active Directory Administrative networking, containers, 168–169
Center), 3–4 Layer 2 Bridge mode, 171
container images, 166 NAT, 169–170
GMSAs (group managed service accounts), 49 transparent mode, 170
IaaS VMs, 122–123 New-ADDCCloneConfig cmdlet, 16
VMs New-ADReplicationSiteLink cmdlet, 40
using HVC.exe, 130 New-ADReplicationSubnet cmdlet, 38
using PowerShell Direct, 130 New-AzADServicePrincipal cmdlet, 115–116
using PowerShell remoting, 129 New-NetNAT cmdlet, 131
Windows Server instances, 113–116 New-StorageQosPolicy cmdlet, 262
Windows updates, 119 New-VMSwitch cmdlet, 131
memory NIC teaming, 156
dynamic, 132 NLS (Network Location Server), 218–219
nested virtualization and, 131 non-authoritative restore, 15
smart paging and, 132–133 non-Azure machines, deploying Azure services on,
Startup, 132–133 117–118
Microsoft Defender for Cloud, integrating with Windows nonexpiring passwords, 80–81
Servers, 121–122 NPS (Network Policy Server), 211, 220, 221. See also
Microsoft Exchange Server, 2 RADIUS servers
modifying authentication, 223
containers, 168 connection request forwarding, 222
virtual hard disks, 150 connection request policies, 220
modules, PowerShell, 106 default, 223–224
monitoring Realm and RADIUS attributes, 223
Azure File Sync, 234–238 encryption, 224–225
replication, 44 IP filters, 224
Move-ADDirectoryServer cmdlet, 40 IP settings, 225

277

Z01_Thomas_index_p269-286.indd 277 01/07/22 2:30 PM


NPS (Network Policy Server)

network policies, creating, 225–227 PowerShell


policy conditions, 221–222 cmdlets, 3
templates, 227 Add-Clusternode, 257
NSGs (network security groups), IaaS VMs and, 181 Add-Computer, 52
ntdsutil.exe, 21 Add-DhcpServer4Filter, 209
metadata cleanup, 21 Add-DHCPServer4Scope, 205
snapshots, 22 Add-DHCPServer6Scope, 205
NTFS, 263–264 Add-DhcpServerv4SuperScope, 206
Add-DNSPrimaryZone, 189
Add-DnsServerConditionalForwarderZone, 193

O-P Add-DNSServerDirectoryPartition, 187


Add-DnsServerPrimaryZone, 187
one-to-many remoting, 107 Add-DNSServerQueryResolutionPolicy, 199
one-way trust, 6 Add-DNSServerSecondaryZone, 188
partitions, 41, 252 Add-DnsServerStubZone, 193
pass-through Add-DnsServerZoneDelegation, 190
authentication, 74 ADDomainMode, 19
disks, 150–151 Add-VMAssignableDevice, 134
password(s) checkpoint-related, 136–137
DSRM (Directory Services Restore Mode), 7–8 DNSServerCache, 197
lockout settings, 79 Enable-PSRemoting, 106–107, 129
managing, 74–75 Enter-PSSession, 107, 129, 130
nonexpiring, 80–81 Get-ADTrust, 34
policies, 75, 76, 78–79 Get-Command-Module <modulename>, 106
protection, 82 Get-NetAdapter, 131
replication, 24–25 Get-PSSessionConfigurationFile, 113
settings permissions, 76 Get-SRPartnership, 260
synchronization, 73–74 Get-StoragePool, 254
PAWs (Privileged Access Workstations), 100–101 getting help with, 106
PDC emulator, 28 GPO management, 84
permissions, 201–202 Install-ADDSForest, 9
NTFS, 263–264 Install-ADServiceAccount, 49
password, 76 Invoke-Command, 108
Windows update deployment, 119 Move-ADDirectoryServer, 40
physical security, domain controllers and, 24 New-ADDCCloneConfig, 16
pointer records, 191 New-ADReplicationSiteLink, 40
policy(ies). See also Group Policy New-ADReplicationSubnet, 38
BranchCache, 247–248 New-AzADServicePrincipal, 115–116
conditions, 221–222 New-NetNAT, 131
connection request, 220 New-StorageQosPolicy, 262
creating, 224 New-VMSwitch, 131
default, 223–224 Register-PSSessionConfiguration, 113
Realm and RADIUS attributes, 223 Set-ADComputer, 50
DHCP, 208 Set-ADForestMode, 20
DNS, 199 Set-ADObject, 9
Kerberos, 51–52 Set-DhcpServerv4DnsSetting, 207
lockout, 79, 81 Set-PhysicalDisk, 254
network, creating, 225–227 Set-SRPartnership, 260
password, 75, 76, 78–79

278

Z01_Thomas_index_p269-286.indd 278 01/07/22 2:30 PM


security

Test-SRTopology, 259 replicated folders and targets, 250


Uninstall-ADDSDomainController, 21 schedules, 251
Direct, VM management, 130 managing and monitoring, 44
Gallery, 106 RODC, 43–44
GMSA management, 49 triggering, 44
JEA (Just Enough Administration), 109 reservations, 208
endpoints, 112–113 resiliency
role-capability files, 110–111 nested, 256
session-configuration files, 111–112 storage space, 253
modules, 106 Storage Spaces Direct, 256–257
remoting, 106–108 resizing, IaaS VMs, 175–176
IaaS VMs and, 177–178 resource
VM management, 129 groups, 134–135
WAC (Windows Admin Center) and, 104–105 records, 190, 194–195
PPTP (Point-to-Point Tunneling Protocol), 215 restoring. See backup and restore
private switches, 157 Resultant Set of Policy tool, 92
Process Automation, 123 RID (Relative ID) master, 28
process isolation, 160 RODCs (read-only domain controllers), 24, 187
protocols, VPN, 214 decommissioning, 26–27
IKEv2, 214–215 local administrators, 26
L2TP/IPsec, 215 password replication, 24–25
PPTP, 215 replication, 43–44
SSTP, 215 role-capability files, 110–111
PSOs (Password Settings Object), 77–78 RSO (replicate-single-object) operation, 43–44
runbooks, 123

Q-R
quotas, FSRM (File Server Resource Manager), 243–244
S
RADIUS servers, 211 sandbox, 159
accounting, 212–213 scavenging, 192
clients, 211–212 scheduling, Hyper-V, 135–136
proxies, 211 schema master, 27
RBAC (remote-based access control), 109, 173–174 search functionality, ADAC (Active Directory Administra-
realm trusts, 33 tive Center), 3–4
ReFS (Resilient File System), 264–265 secondary zones, 188
Register-PSSessionConfiguration cmdlet, 113 second-hop remoting, 108
registration, Azure File Sync server, 235–236 security
Remote Access role service, 210 DNS (Domain Name System), 196
Remote Desktop, 2, 101–102, 130 cache locking, 197
RemoteFX, 134 DANE (DNS-based Authentication of Named
repadmin tool, 44 Entities), 198
replication netmask ordering, 197
AD DS, 41 policies, 199
KCC (Knowledge Consistency Checker), 42 recursion, 197
multi-master, 42 response rate limiting, 198
conflict resolution, 43 socket pool, 196
DFS, 250 DNSSEC (Domain Name System Security Extensions),
groups, 250–251 194–195

279

Z01_Thomas_index_p269-286.indd 279 01/07/22 2:30 PM


security

Group Policy and, 89–90 Storage QoS, 151, 262–263


physical, domain controllers, 24 Storage Replica, 257–258
seizing FMSO roles, 29 requirements, 259–260
Server Core deployment, 8–9 supported configurations, 258–259
service accounts, 48, 164–165 Storage Spaces Direct, 255
session-configuration files, 111–112 cluster nodes, 257
Set-ADComputer cmdlet, 50 deployment options, 256
Set-ADForestMode cmdlet, 20 nested resiliency, 256
Set-ADObject cmdlet, 9 properties, 255–256
Set-DhcpServerv4DnsSetting cmdlet, 207 resiliency types, 256–257
Set-PhysicalDisk cmdlet, 254 store and forward replication, 42
SetSPN utility, 52 stub zones, 193
Set-SRPartnership cmdlet, 260 subnets, 38
shared disks, 174 synchronization, password, 73–74
shared folders, 239–241. See also BranchCache
shortcut trusts, 32
SID filtering, 34–35
site(s), 35–37, 39–40
T
creating, 37–38 tasks, Active Directory Users and Computers, 5
link bridges, 40 templates
subnets, creating, 38 Administrative, 92–93
site-to-site VPN, 228 ARM (Azure Resource Manager), 53
smart paging, 132–133 file screen, 243
SMB Direct, 261–262 NPS, 227
SMTP (Simple Mail Transfer Protocol), reverse lookup quota, 244
zones and, 189 Test-SRTopology cmdlet, 259
snapshots, 22, 175 thin provisioning, 254–255
SPNs (service principal names), 52 tombstone lifetime, 10–12
spoofing, 196 tombstone reanimation, 15
SR-IOV (Single-Root I/O Virtualization), 155–156 tools. See also PowerShell
SSTP (Secure Socket Tunneling Protocol), 214–215 Azure AD Connect, 54–55
State Configuration, 124 deployment account requirements, 57–58
storage Health, 72
disks installing, 58–63
basic, 252 requirements, 56–57
dynamic, 252 SQL Server requirements, 57
partitions, 252 synchronization, 65–67
thin-provisioned, 254–255 Cloud Shell, 122
guest cluster, 145–146 repadmin, 44
Hyper-V Resultant Set of Policy, 92
deduplication, 152 SetSPN, 52
tiering, 152 Validate-DCB, 143
migration, 152–153 Windows Server administration, 100
pools, 253 jump servers, 101
reports, 244–245 PAWs (Privileged Access Workstations), 100–101
space, 253 remote access and, 100
resiliency, 253 Remote Desktop, 101–102
tiering, 254 WAC (Windows Admin Center), 102–105
trim, 255

280

Z01_Thomas_index_p269-286.indd 280 01/07/22 2:30 PM


VMs (virtual machines)

topologies, DirectAccess, 216–217 virtual hard disks


transitivity, trust, 30 differencing disks, 149
transparent networks, 170 dynamically expanding disks, 149
triggering, replication, 44 fixed-size disks, 149
trim, 255 formats, 148
troubleshooting modifying, 150
GPOs, 85–86 pass-through disks, 150–151
IP address issues, 204 Virtual Fibre Channel adapters, 151
Trust Anchor, 195 virtual switches, 156
trust(s), 6, 29, 30 external, 157
direction, 30–31 internal, 157
external, 32 private, 157
forest, 31–32 virtualization
name suffix routing, 35 Hyper-V, 127. See also Hyper-V
netdom.exe and, 34 nested, 130–131
realm, 33 dynamic memory, 131
shortcut, 32 networking, 131
SID filtering, 34–35 VLAN tagging, 155
transitivity, 30 VMs (virtual machines). See also Hyper-V
two-way trust, 6 checkpoints, 136–137
configuring replicas, 138–139
CPU groups, 135

U DDA (Discrete Device Assignment), 133–134


dynamic memory, 132
UGMC (universal group membership caching), 10 Enhanced Session Mode, 130
Uninstall-ADDSDomainController cmdlet, 21 exporting, 153
universal groups, 47 extensions, 117–118
unknown records, 191 Generation 2, 128–129
updates, Windows, 118 high availability, Hyper-V Replica, 137–140
compliance, 119 IaaS, 173
deploying, 118–119 configuring continuous delivery, 176
managing permissions, 119 connections to, 176–179
UPN (user principal name) suffixes, 63–65 data disks, 174
user accounts, 45–46. See also password(s) encryption, 175
inactive, 82 images, 174
locked-out, 81 IP addressing, 180–181
lockout settings, 79 managing, 122–123
nonexpiring passwords, 80–81 NSGs and, 181
UPN (user principal name) suffixes, 63–65 RBAC roles, 173–174
USNs (update sequence numbers), 43 resizing, 175–176
shared disks, 174
snapshots, 175
virtual networks, 179–180, 181
V importing, 153
Validate-DCB tool, 143 integration services, 133
VHD Sets, 147 live migration, 147–148
virtual accounts, 50 MAC address, 153–154
virtual domain controllers, 9, 16, 23 managing
using HVC.exe, 130

281

Z01_Thomas_index_p269-286.indd 281 01/07/22 2:30 PM


VMs (virtual machines)

using PowerShell Direct, 130 DHCP (Dynamic Host Configuration Protocol) server
using PowerShell remoting, 129 role, deploying, 203–204
nested virtualization, 130–131 DNS, 196
dynamic memory, 131 cache locking, 197
networking, 131 DANE (DNS-based Authentication of Named
optimizing network performance, 155 Entities), 198
bandwidth management, 155 event logs, 196
Dynamic Virtual Machine Queue, 156 netmask ordering, 197
SR-IOV, 155–156 policies, 199
resource groups, 134–135 recursion, 197
smart paging, 132–133 response rate limiting, 198
VPN socket pool, 196
authentication, 213–214 IaaS VMs, managing, 122–123
Docker, 1 integration
IaaS virtual networks and, 181 with Azure DNS private zones, 193–194
protocols, 214 with Log Analytics, 120–121
IKEv2, 214–215 with Microsoft Defender for Cloud, 121–122
L2TP/IPsec, 215 joining to an Active Directory instance, 52–53
PPTP, 215 LAN routing, 215
SSTP, 215 managing, 113–116
server configuration, 213 NPS, 220, 221
site-to-site, 228 authentication, 223
connection request forwarding, 222
connection request policies, 220, 223–224

W encryption, 224–225
IP settings, 225
WAC (Windows Admin Center), 102–103 network policies, creating, 225–227
configuring a target machine, 105 policy conditions, 221–222
extensions, 104 templates, 227
installing, 103–104 RemoteFX, 134
managing Azure hybrid services, 105 shared folders, 239–241
showing PowerShell source code, 104–105 updates, 118
Web Application Proxy, 227 compliance, 119
Windows Admin Center, 2, 3, 178 deploying, 118–119
Windows Server, 124 managing permissions, 119
administration tools, 100
jump servers, 101
PAWs (Privileged Access Workstations), 100–101
remote access and, 100
X-Y-Z
Remote Desktop, 101–102 zone(s)
WAC (Windows Admin Center), 102–105 Active Directory-integrated, 186–187
Azure VM extensions, 117–118 aging, 191–192
Backup, 10 delegation, 190
checkpoints, 136 GlobalNames, 189–190
container(s) reverse lookup, 188–189
images, 163–164 secondary zones, 188
service accounts, 164–165 Trust Anchor, 195

282

Z01_Thomas_index_p269-286.indd 282 01/07/22 2:30 PM

You might also like