Sample
Sample
Administering Windows
Server Hybrid Core
Infrastructure
Orin Thomas
SPECIAL SALES
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs;
and content particular to your business, training goals, marketing focus, or
branding interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.
iii
Introduction xiii
Index 269
Introduction xiii
Organization of this book xiii
Microsoft certifications xiv
Quick access to online references xiv
Errata, updates, & book support xiv
Stay in touch xv
vii
Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Thought experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Contents ix
x Contents
Skill 5.2 Configure and manage Windows Server File Shares . . . . . . . . . . . 239
Configure Windows Server File Share access 239
Configure file screens 241
Configure File Server Resource Manager uotas 243
Use additional FSRM functionality 244
Configure ranchCache 247
Implement and configure Distributed File System 248
Contents xi
Index 269
xii Contents
T he AZ-800 exam deals with advanced topics that require candidates to have an excellent
working knowledge of Windows Server and Azure Hybrid functionality. Some of the exam
comprises topics that even experienced Windows Server Hybrid administrators may rarely
encounter unless they are consultants who manage hybrid cloud workloads on a regular basis.
To be successful in taking this exam, not only do candidates need to understand how to deploy
and manage AD DS, hybrid identity, Windows Servers, virtual machines, containers, hybrid
networks, and storage services, but they also need to know how to perform these tasks with
on-premises and Azure IaaS instances of Windows Server.
Candidates for this exam are information technology (IT) professionals who want to validate
their advanced Windows Server Hybrid administration skills and knowledge. To pass, candi-
dates require a thorough theoretical understanding as well as meaningful practical experience
implementing the technologies involved.
This edition of this book covers Windows Server and the AZ-800 exam objectives as of
mid-2022. As Windows Server hybrid technologies evolve, so do the AZ-800 exam objectives,
so you should check carefully if any changes have occurred since this edition of the book was
authored and study accordingly.
This book covers every major topic area found on the exam, but it does not cover every
exam question. Only the Microsoft exam team has access to the exam questions, and Microsoft
regularly adds new uestions to the exam, making it impossible to cover specific uestions.
You should consider this book a supplement to your relevant real-world experience and other
study materials. If you encounter a topic in this book that you do not feel completely comfort-
able with, use the Need more review links you ll find in the text to find more information
and take the time to research and study the topic. Great information is available on Microsoft
Docs, Microsoft Learn, and in blogs and forums.
xiii
xiv Introduction
Stay in touch
Let’s keep the conversation going! We’re on Twitter: http://twitter.com/MicrosoftPress.
Introduction xv
xvii
99
Jump servers
Jump servers are another security procedure that can be used in conjunction with privileged-
access workstations. Jump servers allow servers to accept administrative connections only
from specific hosts. For example, you only allow domain controllers to be administered from
computers that have a specific IP address and a computer certificate issued by a specific
certification authority. You can configure jump servers to only accept connections from PAWs
and servers to be administered to only accept connections from jump servers. As mentioned
earlier, some organizations that use jump servers have them rebuilt and redeployed every 24
hours to ensure that their configuration does not drift from the approved configuration. Azure
provides a service, Azure Bastion, that functions as a managed jump server. You’ll learn more
about using Azure Bastion to access Windows Server IaaS VMs in Chapter 3.
Remote Desktop
Remote Desktop is the way that many administrators are likely to remotely perform one-off
tasks on servers running the GUI version of Windows Server. While best practice is to use
PowerShell or Windows Admin Center for remote administration, sometimes it’s quicker to
just establish a Remote Desktop session. This is because using Remote Desktop allows you to
You can make Remote Desktop connections to computers running the Server Core installa-
tion option if Remote Desktop is enabled.
By default, Remote Desktop Connection connects to Remote Desktop services on port
3389. When you enable Remote Desktop using the GUI, a remote desktop related firewall
is automatically enabled. If you enable Remote Desktop using PowerShell, you also need
to manually enable a firewall rule to allow connections. You can do this using the following
PowerShell command:
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"
By default, the Allow connections only from computers running Remote Desktop with
Network Level Authentication option is selected. Network Level Authentication requires
that a user be authenticated prior to the Remote Desktop session being established. Network
Level Authentication is supported by the Remote Desktop Connection client, which is avail-
able on all Windows operating systems, but it might not be supported by third-party Remote
Desktop clients.
Only users who are members of the local Administrators group and members of the local
Remote Desktop Users group can make connections via Remote Desktop. If you want to grant
a user account permission to access the server without the account full administrative privi-
leges, add the account to the local Remote Desktop Users group.
You can map local volumes to a remote host in an active Remote Desktop Connection ses-
sion by configuring the Local Resources and Devices setting on the Local Resources tab of
the Remote Desktop Connection dialog box. While it is less effective over low-bandwidth
connections, it can provide a simple way to transfer files from your client computer to a remote
server instead of setting up FTP or another file transfer method.
Installing WAC
Windows Admin Center isn’t included in Windows Server. You have to download the instal-
lation files from the Microsoft website. There are four Windows Admin Center deployment
options:
■ Local client When you choose this installation option, you install Windows Admin
Center on your workstation. You connect to the WAC instance locally, which is similar to
installing the Remote Server Administration Tools (RSAT) on a local workstation. When
you install WAC locally, a shortcut to the WAC console is placed on your desktop.
■ Gateway server When you install WAC in the gateway server configuration, you
install it on a computer running Windows Server 2016 or later and then make remote
connections to the WAC instance hosted on that computer through your preferred
browser. Once connected to the WAC instance, you can add servers that you want
to manage to the web-based console. When you perform an administrative task, the
instructions to perform that task are issued from the gateway server and are run against
the target server.
■ Managed server The managed server deployment is a version of WAC in a gateway
server configuration deployed on a cluster node to manage the cluster.
■ Failover cluster The gateway server is deployed as a highly available service. This
re uires the configuration of a Cluster Shared Volume to store persistent data used by
WAC. A script is available from the Microsoft website that simplifies the process of per-
forming a high availability deployment.
When you install WAC on a Windows Server instance, you get the option of configuring
which port will be used. You can choose between using a self-signed SSL (TLS) certificate or
an SSL (TLS) certificate that is already installed on the computer. If you re deploying a gateway
server, things will be a lot simpler if you deploy a TLS certificate from a trusted CA because it
won’t be necessary to go through the hassle of responding to dialog boxes about whether to
trust the self-signed certificate when connecting to the gateway server from a variety of differ-
ent administrative systems.
You can install Windows Admin Center on a Server Core instance of Windows Server using
msiexec and by specifying the management port and SSL certificate option. (It should be the
TLS certificate since the SSL protocol has been phased out, but most of the world still uses the
SME_PORT is the port you want to use, and SME_THUMBPRINT is the thumbprint of the
installed SSL (TLS) certificate. y default, installing WAC updates the computer s trusted host
files. When you deploy WAC, you can configure it to update automatically or manually. When
you configure WAC to update automatically, new versions will be installed as they become
available through Microsoft Update. If you don t configure this option, you ll need to manually
install newer versions of WAC as they become available.
To update an expired certificate on a WAC gateway server, you need to obtain and install
the new certificate, obtain the certificate s thumbprint, and then rerun Setup and change the
certificate used by WAC by specifying the new thumbprint.
Show script
When you perform a task in Windows Admin Center, you can select the PowerShell icon in
the Windows Admin Center title bar to view PowerShell source code relevant to the tasks.
In addition to the WinRM ports, WAC uses the SM file sharing protocol for some file copy-
ing tasks. To configure a target machine for remote management by WAC, you will need to
ensure any firewalls between the WAC instance and the target computer allow inbound con-
nections on ports 445, 5985, and 4986.
To use Windows Admin Center from the Azure portal to manage Windows Server instances
in Azure, it’s necessary to deploy Windows Admin Center to each Windows Server Azure IaaS
instance.
Modules
Modules are collections of PowerShell cmdlets. In older versions of PowerShell, you needed
to manually load a module each time you wanted to use one of its associated cmdlets. In
Windows Server 2016 and later, any module that is installed will load automatically when you
try to run an associated cmdlet. Viewing cmdlets by module using the Get-Command-Module
<modulename> cmdlet allows you to view just those cmdlets associated with a specific role or
feature.
PowerShell Gallery
The PowerShell Gallery is a collection of modules published by the community that extend
the functionality of PowerShell beyond what is available with a default installation of Win-
dows Server. Table 2-1 lists the commands that you can use to get started with the PowerShell
Gallery.
Command Functionality
Find-Module -Repository This will list the available modules in the PowerShell Gallery in a
PSGallery | out-host -paging paged format. You’ll be prompted to install the NuGetProvider to
interact with the PowerShell Gallery.
Find-Module -Repository This will list the modules with a specific name. You can use wild-
PSGallery -Name <ModuleName> cards. For example, to view all modules that start with the name
AzureRM, run the command Find-Module -Repository
PSGallery -Name AzureRM*.
Install-Module -Repository This will install the Modulename module. For example, to install the
PSGallery -Name <ModuleName> AzureRM module, run the command Install-Module
-Repository PSGallery -Name AzureRM.
Update-Module This will update any module that you’ve installed using
Install-Module.
Get-InstalledModule Use this command to view all modules installed from the Power-
Shell Gallery.
PowerShell remoting
PowerShell remoting allows you to establish a remote interactive PowerShell session from a
local PowerShell session on an administrative workstation or Cloud Shell. By default, Power-
Shell remoting is enabled on Windows Server instances but also requires a connection from a
You initiate a remote PowerShell session using the enter-pssession command. If you do
not specify alternate credentials, the credentials of the currently signed-on user will be used.
If you want to use alternate credentials, one method to do so securely is by using the get-
credential command and assigning it to a PowerShell variable, and then using the variable
with the enter-pssession command. When you use get-credential, you will be prompted
to enter a set of credentials. For example, to enter a set of credentials and then to use those
credentials to establish a remote PowerShell session to a host named dc1.tailwindtraders.com,
use the following commands:
$creds = get-credential
Enter-pssession -Computername dc1.tailwindtraders.com -credential $creds
To enable PowerShell remoting to computers that are not domain-joined, you must config-
ure the trusted hosts list on the client computer from which you want to establish the remote
session. You do this on the client computer using the set-item cmdlet. For example, to trust
the computer at IP address 192.168.3.200, run this command:
Set-Item wsman:\localhost\Client\TrustedHosts -Value 192.168.3.200 -Concatenate
Once you ve run the command to configure the client, you ll be able to establish a Power-
Shell remote session using the Enter-PSSession cmdlet. If you want more information about
remoting, run the following command to bring up help text on the subject:
Help about_Remote_faq -ShowWindow
PowerShell allows you to run one command against many machines, which is known as one-
to-many remoting or fan-out administration. You can use one-to-many remoting to run the
same command against any number of computers. Rather than signing in to each computer to
check whether a particular service is running, you can use PowerShell remoting to run the same
command that checks the status of the service against each computer within the scope of the
command.
For example, you could use the following command to read a list of computers from a text
file named computers.txt
$Computers = Get-Content c:\Computers.txt
You could then use the following command to get the properties of the Windows Update
service:
Invoke-Command -ScriptBlock { get-service wuauserv } -computername $Computers
erberos constrained delegation allows you to limit which of a computer s services can
interact with the DC to obtain the appropriate ticket on the user s behalf. You can configure
constrained delegation on the Delegation tab of a computer account’s properties in Active
Directory Users and Computers. When you do this, you specify the service type, the user or
computer account that can leverage delegated credentials, the port, and the service principal
name of the service that can perform the action.
Once the PSRC file is created, you edit the role-capability file and add the cmdlets, func-
tions, and external commands that are available when a user is connected to the endpoint.
You can allow entire Windows PowerShell cmdlets or functions or list which parameters and
parameter values can be used.
You can edit a role-capability file in PowerShell ISE, Visual Studio Code (though only the first
is available on Windows Server), or any capable text editor. Editing the file involves comment-
ing out the appropriate sections and filling them in with the configuration items that you want
to set.
Authoring role-capability files is one of those few times when you need to know whether
something in PowerShell is a cmdlet or a function. Mostly, people refer to commands in
PowerShell as cmdlets, but some are actually functions and others are aliases. You need
to know the appropriate type when configuring a role-capability file because if you put a
function in as an allowed cmdlet, you won t get the expected result. You can figure out which
designation is appropriate by using the Get-Command cmdlet.
Table 2-2 describes the different options that you can configure in a role-capability file.
Capability Description
ModulesToImport JEA auto-loads standard modules, so you probably don’t need to use this unless you
need to import custom modules.
VisibleAliases Specifies which aliases to make available in the EA session. Even if an aliased cmdlet is
available, the alias won’t be available unless it’s here.
VisibleCmdlets Lists which Windows PowerShell cmdlets are available in the session. You can extend
this by allowing all parameters and parameter values to be used or you can limit cmd-
lets to particular parameters and parameter values. For example, use the following
syntax, if you wanted to allow the Restart-Service cmdlet to only be used to restart
the DNS service:
VisibleCmdlets = @{ Name = 'Restart-Service'; Parameters = @{
Name='Name'; ValidateSet = 'DNS'}}
VisibleFunctions This field lists which Windows PowerShell functions are available in the session. You
can choose to list functions, allowing all parameters and parameter values to be used,
or you can limit functions to particular parameters and parameter values. For example,
if you wanted to allow the Add-DNSServerResourceRecord, Get-DNSServer
ResourceRecord, and Remove-DNSServerResource functions to be used, you would
use the following syntax:
VisibleFunctions = 'Add-DNSServerResourceRecord',
'Get-DNSServerResourceRecord','Remove-DNSServerResourceRecord'
VisibleExternal This field allows users who are connected to the session to run external commands. For
Commands example, you can use this field to allow access to c:\windows\system32\whoami.exe so
that users connected to the JEA session can identify their security context by using the
following syntax:
VisibleExternalCommands = 'C:\Windows\System32\whoami.exe'
VisibleProviders This field lists Windows PowerShell providers that are visible to the session.
ScriptsToProcess This field allows you to configure Windows PowerShell scripts to run automatically
when the session is started.
AliasDefinitions This field allows you to define Windows PowerShell aliases for the EA session.
FunctionDefinitions This field allows you to define Windows PowerShell functions for the EA session.
VariableDefinitions This field allows you to define Windows PowerShell variables for the EA session.
EnvironmentVariables This field allows you to specify environment variables for the EA session.
TypesToProcess This field allows you to configure Windows PowerShell type files to load for the EA
session.
FormatsToProcess This field allows you to configure Windows PowerShell formats to load for the EA
session.
AssembliesToLoad This field allows you to specify which assemblies to load for the EA session.
Field Explanation
SessionType This field allows you to configure the session s default settings. If you set this to
RestrictedRemoteServer, you can use the Get-Command, Get-FormatData,
Select-Object, Get-Help, Measure-Object, Exit-PSSession, Clear-Host, and
Out-Default cmdlets. The session execution policy is set to RemoteSigned.
Example:
SessionType = 'RestrictedRemoteServer'
RoleDefinitions You use the RoleDefinitions entry to assign role capabilities to specific security
groups. These groups do not need to have any privileges and can be standard secu-
rity groups.
Example:
RoleDefinitions =@{'CONTOSO\DNSOps' = @{RoleCapabilities='DNSOps'}}
RunAsVirtualAccount When enabled, this field allows EA to use a privileged virtual account created just
for the JEA session. This virtual account has local administrator privileges on mem-
ber servers and is a member of the Domain Admins group on a domain controller.
Use this option to ensure that credentials are not cached on the server that hosts the
endpoint. Remember that you can configure the virtual account to be a member of
groups other than the local administrators group.
TranscriptDirectory This field allows you to specify the location where EA activity transcripts are stored.
RunAsVirtual If you do not want the virtual account to be a member of the local administrators
AccountGroups group (or Domain Admins on a domain controller), you can instead use this field to
specify the groups in which the virtual account is a member.
JEA endpoints
A EA endpoint is a Windows PowerShell endpoint that you configure so that only specific
authenticated users can connect to it. When those users do connect, they only have access to
the Windows PowerShell cmdlets, parameters, and values defined by the appropriate session-
configuration file that links security groups and role capabilities. When you use endpoints with
virtual accounts, the actual activity that a user performs on the server that hosts the endpoint
occurs using the virtual account. This means that no domain-based administrative credentials
are stored on the server that hosts the endpoint.
A server can have multiple JEA endpoints, and each JEA endpoint can be used for a dif-
ferent administrative task. For example, you could have a DNSOps endpoint to perform DNS
administrative tasks and an IISOps endpoint to perform Internet Information Server–related
administrative tasks. Users are not required to have privileged accounts that are members of
groups, such as the local administrators group, to connect to an endpoint. Once connected, users
have the privileges assigned to the virtual account configured in the session-configuration file.
Once you ve verified that EA works, you ll need to lock down the default PowerShell end-
point. By default, only members of the local administrators group can connect to this default
endpoint, and if you’ve implemented JEA properly, this group shouldn’t need to have very
many members anyway.
EXAM TIP
emember which owerShell cm lets are rele ant to specific A tas s
Skill 2.2: Manage Windows Servers and workloads by using Azure Services CHAPTER 2 113
A
access-denied assistance, 247 DSRM (Directory Services Restore Mode), 7–8
Active Directory Domains and Trusts, 6 forests, 16
Active Directory Federation Services, 74 Group Policy, 83. See also AGPM (Advanced Group
Active Directory Recycle Bin, 12–13 Policy Management); Group Policy
Active Directory Sites and Services, 6 Administrative template, 92–93
Active Directory Users and Computers, 5 caching, 91
Delegation of Control Wizard, 5 fixing GPO problems, 85–86
tasks, 5 forced update, 91–92
View Advanced Features function, 5 GPO backup, 84–85
Active Directory-integrated zones, 186–187 GPO management, 83–85, 86
AD DS (Active Directory Domain Services), 1, 9. See also implementing, 95
Azure AD; domain(s) import and copy GPOs, 85
backup, 10 loopback processing, 90–91
database optimization, 20–21 preferences, 93–94
DNS integration, 186, 188, 192 security filtering, 89–90
Active Directory-integrated zones, 186–187 WMI filters, 90
alias (CNAME) records, 191 groups, 47
conditional forwarders, 193 integration with other AD instances, 71
forwarders, 192–193 metadata cleanup, 21
GlobalNames zones, 189–190 multi-domain forests, 17–18
host records, 190 partitions, 41
MX (mail exchanger) records, 191 password(s)
pointer records, 191 managing, 74–75
resource records, 190, 194–195 policy items, 75
reverse lookup zones, 188–189 replication, 24–25
scavenging, 192 settings permissions, 76
secondary zones, 188 replication, 41
stub zones, 193 conflict resolution, 43
unknown records, 191 KCC (Knowledge Consistency Checker), 42
zone aging, 191–192 managing and monitoring, 44
zone delegation, 190 multi-master, 42
domain(s), 16–17 RODC, 43–44
authentication and, 18 store and forward, 42
controllers, 1–2, 6–7 triggering, 44
forests and, 19–20 security, 45
functional levels, 19 site(s), 35–37
trees and, 18 creating, 37–38
link bridges, 40
269
270
271
272
273
E filesystems
FAT/FAT32, 265
editing, GPOs, 87 NTFS, 263–264
Enable-PSRemoting cmdlet, 106–107, 129 ReFS, 264–265
encryption fine-grained password policies, 76–77
IaaS VMs, 175 FMSO roles, 26–27
NPS and, 224–225 domain naming master, 27
endpoints infrastructure master, 28
Azure File Sync, creating, 236 PDC emulator, 28
cloud, 235 RID master, 28
JEA, 109, 112–113 seizing, 29
Enhanced Session Mode, 130 forests, 16, 19–20
Enter-PSSession cmdlet, 107, 129, 130 authentication and, 18
ESAE (Enhanced Security Administrative Environment), ESAE (Enhanced Security Administrative Environ-
forests, 20 ment), 20
event logs, DNS, 196 multi-domain, 17–18
exporting, VMs, 153 trusts and, 31–32
extensions forwarders, 192–193
Azure VM, 117–118 FSRM (File Server Resource Manager)
Extended Network, 220 access-denied assistance, 247
WAC (Windows Admin Center), 104 file classification, 245–246
external switches, 157 file management tasks, 246
external trusts, 32 quotas, 243–244
storage reports, 244–245
F
failover
G
clustering, 140 gateway server, 103
Active Directory detached clusters, 143–144 Generation 2 VMs, 128–129
cluster networking, 142–143 Get-ADTrust cmdlet, 34
cluster node weight, 142 Get-Command-Module <modulename> cmdlet, 106
cluster quorum, 141 get-credential command, 107
Cluster Shared Volumes, 143 Get-NetAdapter cmdlet, 131
dynamic quorum, 142 Get-PSSessionConfigurationFile cmdlet, 113
Force Quorum Resiliency, 143 Get-SRPartnership cmdlet, 260
guest clusters, 145–147 Get-StoragePool cmdlet, 254
host cluster storage, 140 global catalog servers, 9–10
preferred owner and failover settings, 144 global groups, 48
VM drain on shutdown, 144–145 GlobalNames zones, 189–190
VM Network Health Detection, 144 GMSAs (group managed service accounts), 48, 49–50,
DHCP, 209 164–165
replica, 139–140 GPMC (Group Policy Management Console), 83–85
fan-out administration, 107 Group Policy, 83, 95, 247. See also AGPM (Advanced
FAT/FAT32, 265 Group Policy Management)
file classification, 245–246 Administrative template, 92–93
file screen(s), 241 caching, 91
file groups and, 241–242 DNSSEC and, 195
templates, 243 forced update, 91–92
274
275
I tracking, 202–203
server discovery, 201
IaaS VMs, 173 IPsec, 215
configuring continuous delivery, 176
connecting
with Azure AD account, 176–177
JIT access, 178
J
with Remote PowerShell, 177–178 JEA (Just Enough Administration), 109
using Azure Bastion, 178 endpoints, 112–113
using Azure Serial Console, 179 role-capability files, 110–111
using Windows Admin Center, 178 session-configuration files, 111–112
data disks, 174 JIT (Just-in-Time) VM access, 178
encryption, 175 joining
images, 174 domains, 70
IP addressing, 180–181 Windows Server to an Active Directory instance,
managing, 122–123 52–53
NSGs and, 181 jump servers, 101
RBAC roles, 173–174
resizing, 175–176
shared disks, 174
snapshots, 175
K
virtual networks, 179–180, 181 KCC (Knowledge Consistency Checker), 42
identities, hybrid, 54 Kerberos
IKEv2, 214–215 delegation, 50, 108
importing, VMs, 153 policies, 51–52
inactive accounts, 82 SPNs (service principal names), 52
infrastructure master, 28
Install-ADDSForest cmdlet, 9
Install-ADServiceAccount cmdlet, 49
installing L
Azure AD Connect, 58–63 L2TP, 215
Azure Monitor, 121 LAN routing, 215
BranchCache, 247 Layer 2 Bridge networks, 171
Docker, 160–161
276
M networking, 131
netdom trust command, 34
MAC address, VM, 153–154 netdom.exe, 34
managing. See also administration tools network adapters, Hyper-V
AD DS passwords, 74–75 network isolation, 155
Azure AD, 2–3 NIC teaming, 156
using Active Directory Domains and Trusts, 6 VM MAC address and, 153–154
using AD sites and Services, 6 Network Service (NT AUTHORITY\NetworkService)
using AD Users and Computers, 5 account, 49
using ADAC (Active Directory Administrative networking, containers, 168–169
Center), 3–4 Layer 2 Bridge mode, 171
container images, 166 NAT, 169–170
GMSAs (group managed service accounts), 49 transparent mode, 170
IaaS VMs, 122–123 New-ADDCCloneConfig cmdlet, 16
VMs New-ADReplicationSiteLink cmdlet, 40
using HVC.exe, 130 New-ADReplicationSubnet cmdlet, 38
using PowerShell Direct, 130 New-AzADServicePrincipal cmdlet, 115–116
using PowerShell remoting, 129 New-NetNAT cmdlet, 131
Windows Server instances, 113–116 New-StorageQosPolicy cmdlet, 262
Windows updates, 119 New-VMSwitch cmdlet, 131
memory NIC teaming, 156
dynamic, 132 NLS (Network Location Server), 218–219
nested virtualization and, 131 non-authoritative restore, 15
smart paging and, 132–133 non-Azure machines, deploying Azure services on,
Startup, 132–133 117–118
Microsoft Defender for Cloud, integrating with Windows nonexpiring passwords, 80–81
Servers, 121–122 NPS (Network Policy Server), 211, 220, 221. See also
Microsoft Exchange Server, 2 RADIUS servers
modifying authentication, 223
containers, 168 connection request forwarding, 222
virtual hard disks, 150 connection request policies, 220
modules, PowerShell, 106 default, 223–224
monitoring Realm and RADIUS attributes, 223
Azure File Sync, 234–238 encryption, 224–225
replication, 44 IP filters, 224
Move-ADDirectoryServer cmdlet, 40 IP settings, 225
277
278
Q-R
quotas, FSRM (File Server Resource Manager), 243–244
S
RADIUS servers, 211 sandbox, 159
accounting, 212–213 scavenging, 192
clients, 211–212 scheduling, Hyper-V, 135–136
proxies, 211 schema master, 27
RBAC (remote-based access control), 109, 173–174 search functionality, ADAC (Active Directory Administra-
realm trusts, 33 tive Center), 3–4
ReFS (Resilient File System), 264–265 secondary zones, 188
Register-PSSessionConfiguration cmdlet, 113 second-hop remoting, 108
registration, Azure File Sync server, 235–236 security
Remote Access role service, 210 DNS (Domain Name System), 196
Remote Desktop, 2, 101–102, 130 cache locking, 197
RemoteFX, 134 DANE (DNS-based Authentication of Named
repadmin tool, 44 Entities), 198
replication netmask ordering, 197
AD DS, 41 policies, 199
KCC (Knowledge Consistency Checker), 42 recursion, 197
multi-master, 42 response rate limiting, 198
conflict resolution, 43 socket pool, 196
DFS, 250 DNSSEC (Domain Name System Security Extensions),
groups, 250–251 194–195
279
280
281
using PowerShell Direct, 130 DHCP (Dynamic Host Configuration Protocol) server
using PowerShell remoting, 129 role, deploying, 203–204
nested virtualization, 130–131 DNS, 196
dynamic memory, 131 cache locking, 197
networking, 131 DANE (DNS-based Authentication of Named
optimizing network performance, 155 Entities), 198
bandwidth management, 155 event logs, 196
Dynamic Virtual Machine Queue, 156 netmask ordering, 197
SR-IOV, 155–156 policies, 199
resource groups, 134–135 recursion, 197
smart paging, 132–133 response rate limiting, 198
VPN socket pool, 196
authentication, 213–214 IaaS VMs, managing, 122–123
Docker, 1 integration
IaaS virtual networks and, 181 with Azure DNS private zones, 193–194
protocols, 214 with Log Analytics, 120–121
IKEv2, 214–215 with Microsoft Defender for Cloud, 121–122
L2TP/IPsec, 215 joining to an Active Directory instance, 52–53
PPTP, 215 LAN routing, 215
SSTP, 215 managing, 113–116
server configuration, 213 NPS, 220, 221
site-to-site, 228 authentication, 223
connection request forwarding, 222
connection request policies, 220, 223–224
W encryption, 224–225
IP settings, 225
WAC (Windows Admin Center), 102–103 network policies, creating, 225–227
configuring a target machine, 105 policy conditions, 221–222
extensions, 104 templates, 227
installing, 103–104 RemoteFX, 134
managing Azure hybrid services, 105 shared folders, 239–241
showing PowerShell source code, 104–105 updates, 118
Web Application Proxy, 227 compliance, 119
Windows Admin Center, 2, 3, 178 deploying, 118–119
Windows Server, 124 managing permissions, 119
administration tools, 100
jump servers, 101
PAWs (Privileged Access Workstations), 100–101
remote access and, 100
X-Y-Z
Remote Desktop, 101–102 zone(s)
WAC (Windows Admin Center), 102–105 Active Directory-integrated, 186–187
Azure VM extensions, 117–118 aging, 191–192
Backup, 10 delegation, 190
checkpoints, 136 GlobalNames, 189–190
container(s) reverse lookup, 188–189
images, 163–164 secondary zones, 188
service accounts, 164–165 Trust Anchor, 195
282