Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By : Chris Gill
Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By: Chris Gill

Overview of this book

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career. With this book, you’ll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you’ll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server. You’ll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You’ll also learn how to monitor and troubleshoot Windows Server environments. By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.
Table of Contents (31 chapters)
1
Part 1: Exam Overview and the Current State of On-Premises, Hybrid, and Cloud Workflows
3
Part 2: Secure Windows Server On-Premises and Hybrid Infrastructures
9
Part 3: Implement and Manage Windows Server High Availability
13
Part 4: Implement Disaster Recovery
17
Part 5: Migrate Servers and Workloads
23
Part 6: Monitor and Troubleshoot Windows Server Environments

Configuring and managing Windows Defender Credential Guard

A lot of businesses are still using numerous security measures to enforce password complexity, recommend password best practices and hygiene, and even require password changes or resets on a scheduled basis. Let’s be honest – the world of security and password management has changed drastically, and passwords are now the weakest link in the security chain.

One of the ways we can protect and isolate these frequently used secrets is to utilize a virtualization-based security model called Windows Defender Credential Guard, which is backed by hardware security to deter targeted and credential theft attacks in the wild. This model blocks unauthorized access to the secrets so that only the Windows-privileged subsystem can gain access to them. For instance, when Credential Guard is enabled on a Windows system, the lsass.exe process is wrapped with Credential Guard and runs the Lsalso.exe process with the added protections...