WS-011 Windows Server 2019 Administration
WS-011 Windows Server 2019 Administration
Server 2019
Administration
Lessons:
o Lesson 1: Hyper-V in Windows Server
o Lesson 2: Configuring VMs
o Lesson 3: Securing virtualization in Windows Server
o Lesson 4: Containers in Windows Server
o Lesson 5: Overview of Kubernetes
Lesson 1: Hyper-V in
Windows Server
Hyper-V in Windows Server
Finally, you will learn considerations, requirements, and processes for migrating on-premises
Hyper-V virtual machines to Microsoft Azure
Topics:
o Overview of Hyper-V
o Overview of Hyper-V Manager
o Best practices for configuring Hyper-V hosts
o Overview of nested virtualization
o Migration to Azure VMs
Overview of Hyper-V (1 of 2)
o Linux
o FreeBSD
o Portability
o Security
o Optimization
Overview of Hyper-V (2 of 2)
o Sufficient memory
o PowerShell Direct
Provides the ability to install the Hyper-V role within a guest virtual machine
Requirements:
o Both the Hyper-V host and the guest virtual machine must be Windows Server 2016
or later
o Sufficient amount of static RAM
o Virtual machines must have a configuration version of 8.0 or greater
o Physical host computer mush have an Intel processor with VT-x and Extended Page
Tables (EPT) technology
o MAC address spoofing enabled
Azure Migrate can be used to migrate on-premises workloads, apps, and virtual
machines
Azure Migrate provides the following benefits:
o A single migration platform
• Servers
• Databases
• Web applications
• Virtual desktops
• Data
Lesson 1: Check your knowledge
In this lesson, you learn the concepts related to virtual machine configurations and generation versions.
You also learn VM settings, storage options, and virtual disk types. Finally, you learn about the types of
virtual networks and how to create and manage a virtual machine
Topics:
o VM configuration and generation versions
o VM settings
o Storage options in Hyper-V
o Virtual hard disk formats and types
o Shared VHDX and VHD Set files
o Overview of Hyper-V networking
o Networking features for Hyper-V
o Manage VM states and checkpoints
o Import and export VMs
o Demonstration: Create and manage a VM
VM configuration and generation versions
Available hardware
components depend on the
generation version of the
VM
Storage options in Hyper-V
Consider the following factors when planning storage for virtual hard disks:
o High-performance connection to storage
o Redundant storage
o High-performance storage
• Up to 64 TB in size
• Recovery from corruption issues
• Supports larger block size resulting in increased performance
Use the Edit Virtual Hard Disk Wizard to convert between hard disk formats
Various tools can be used to create and mange virtual hard disks:
o Hyper-V Manager
o Disk Management/Diskpart
o PowerShell (New-VHD)
Dynamic The disk only uses the amount of space that needs to be
allocated, and it grows as necessary
NIC
VMQ teaming
Port
mirroring
IPsec task
offloading
Hyper-V
networking Router
guard
SR-IOV
DHCP guard
Network
virtualizatio Bandwidth
n management
Networking features for Hyper-V (2 of 2)
SET
RDMA
VMMQ
Hyper-V
networking
Converged NAT
network Virtual
adapters switch
Manage VM states and checkpoints
Hyper-V supports the concept of a guarded fabric to provide a more secure environment for
virtual machines
In this lesson, you are introduced to the concept of implementing a guarded fabric, including
the Host Guardian Service, guarded host servers, and shielded virtual machines
Topics:
o Guarded fabric
o Attestation modes for guarded fabric
o Host Guardian Service
o Types of protected VMs in a guarded fabric
o General process for creating shielded VMs
o Process for powering on shielded VMs
Guarded fabric (1 of 2)
Guarded fabric attestation is the process of evaluating and validating the Hyper-V host
Attestation Description
mode
Certain components
blocked such as
Integration Configurable by PowerShell Direct
components fabric admin (enabled in Windows
Server v1803), and data
exchange
By using container technology, you can package, provision, and run applications across
diverse environments located on-premises or in the cloud
In this lesson, you are introduced to the concept of preparing and using Windows containers
Topics:
o What are containers?
o Containers vs. virtual machines
o Overview of container isolation modes
o Manage containers using Docker
o Download container base images
o Run a Windows container
o Manage containers using Windows Admin Center
o Demonstration: Deploy containers by using Docker
What are containers?
Process Isolation:
o “Traditional” isolation mode
o Containers share the same kernel with each other and the host
o Each container has its own user mode
o Does not provide security-enhanced isolation
o Uses the following switch when starting a container using Docker:
–isolation=process
Hyper-V Isolation:
o Each container runs inside of a highly optimized virtual machine
o Each container gains its own kernel and an enhanced level of stability and security
o Also provides hardware-level isolation between each container and the host
o Uses the following switch when starting a container using Docker:
–isolation=hyperv
Manage containers using Docker (1 of 2)
Docker container:
o Application wrapped in a complete file system including:
• Code
• Runtime
• System tools
• Supporting files for the app
o Based upon open standards to run on all major operating systems
Topics:
o What is Windows container orchestration?
o Overview of Kubernetes on Windows
o Deploy Kubernetes resources
What is Windows container orchestration?
Kubernetes Pods:
o A workload consisting of one or more
containers disbursed throughout multiple
worker nodes within the cluster
Includes information about the shared storage,
network configuration, and specification on
how to run its packaged containers
Defined as Pod Templates
Deploy Kubernetes resources
Cloud services such Azure Kubernetes Service (AKS) reduce many of the challenges of
manually configuring Kubernetes clusters by providing a hosted Kubernetes environment
Lesson 5: Check your knowledge
o WS-011T00A-SEA-ADM1
o WS-011T00A-SEA-SVR1
Username: Contoso\Administrator
Password: Pa55w.rd
Lab scenario
Contoso is a global engineering and manufacturing company with its head office in Seattle,
USA. An IT office and data center are in Seattle to support the Seattle location and other
locations.
Contoso recently deployed a Windows Server 2019 server and client infrastructure.
Due to many physical servers being currently underutilized, the company plans to expand
virtualization to optimize the environment. Because of this, you decide to perform a proof of
concept to validate how Hyper-V can be used to manage a virtual machine environment.
Also, the Contoso DevOps team wants to explore container technology to determine whether
they can help reduce deployment times for new applications and to simplify moving
applications to the cloud. You plan to work with the team to evaluate Windows Server
containers and to consider providing Internet Information Services (Web services) in a
container.
Lab-review questions
1. In Exercise 1, you created a Hyper-V virtual switch as a Private Network. Describe the
impact to your virtual network by using this type of virtual switch.
2. In Exercise 2, which command did you use to browse the Docker base images from the
online repository?
Lab-review answers
1. In Exercise 1, you created a Hyper-V virtual switch as a Private Network. Describe the
impact to your virtual network by using this type of virtual switch.
• Answer: The Private Network only allows communication between virtual machines
running on the host machine.
2. In Exercise 2, which command did you use to browse the docker base images from the
online repository?
• Answer: Docker search Microsoft
Module-review questions
1. Which of the following are requirements for installing the Hyper-V server role? Choose two.
2. You plan to enable nested virtualization on a Hyper-V host. What do you need to do to
ensure that the nested VM can route to external destinations?
3. Which of the following are true for considerations when implementing a Host Guardian
service? Choose two.
4. Which of the following are requirements for creating a shielded template disk? Choose
two.
5. You download a container base image. When you attempt to create and run a container
using the base image, you get an error message that relates to incompatibility with the
host machine. What should you do?
6. Which of the following can be used as worker nodes in a Kubernetes cluster? Choose two.
Module-review answers
1. Which of the following are requirements for installing the Hyper-V server role? Choose two.
• Answer: A 64-bit processor, Intel VT or AMD-V enabled
2. You plan to enable nested virtualization on a Hyper-V host. What do you need to do to ensure that the nested
VM can route to external destinations?
• Answer: Enable MAC address spoofing
3. Which of the following are true for considerations when implementing a Host Guardian service? Choose two.
• Answer: A new Active Directory forest is created dedicated to the Host Guardian Service; The Host Guardian
Service uses certificates for signing and encryption tasks
4. Which of the following are requirements for creating a shielded template disk? Choose two.
• Answer: A basic disk; Must be generalized
5. You download a container base image. When you attempt to create and run a container using the base image,
you get an error message that relates to incompatibility with the host machine. What should you do?
• Answer: Download a new container base image that matches the version of operating system installed on
the host machine
6. Which of the following can be used as worker nodes in a Kubernetes cluster. Choose two.
• Answer: Windows Server 2019; Linux
Thank you.