Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By : Chris Gill
Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By: Chris Gill

Overview of this book

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career. With this book, you’ll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you’ll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server. You’ll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You’ll also learn how to monitor and troubleshoot Windows Server environments. By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.
Table of Contents (31 chapters)
1
Part 1: Exam Overview and the Current State of On-Premises, Hybrid, and Cloud Workflows
3
Part 2: Secure Windows Server On-Premises and Hybrid Infrastructures
9
Part 3: Implement and Manage Windows Server High Availability
13
Part 4: Implement Disaster Recovery
17
Part 5: Migrate Servers and Workloads
23
Part 6: Monitor and Troubleshoot Windows Server Environments

Configuring and managing WDAC

In a nutshell, WDAC works to combat untrusted software, malware, and other vulnerabilities running on your devices. In a trust what you know and know what you trust approach, this means that only known and approved code will be able to run on your devices. This approach is super useful in high-security departments or government agencies, as you are equipped with an incredible amount of control over what can and cannot run.

For the most part, Windows Store apps, signed drivers, Windows operating system base components, Configuration Manager clients and software deployments, and updates that target standard Windows components are all marked as allowed and can run. The key differentiator with WDAC is that this feature makes use of the Microsoft Intelligent Security Graph, allowing you to trust applications that have been vetted by Microsoft and reducing your overall WDAC policy management.

We can utilize several deployment methods to deploy WDAC policies...