Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By : Chris Gill
Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By: Chris Gill

Overview of this book

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career. With this book, you’ll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you’ll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server. You’ll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You’ll also learn how to monitor and troubleshoot Windows Server environments. By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.
Table of Contents (31 chapters)
1
Part 1: Exam Overview and the Current State of On-Premises, Hybrid, and Cloud Workflows
3
Part 2: Secure Windows Server On-Premises and Hybrid Infrastructures
9
Part 3: Implement and Manage Windows Server High Availability
13
Part 4: Implement Disaster Recovery
17
Part 5: Migrate Servers and Workloads
23
Part 6: Monitor and Troubleshoot Windows Server Environments

Securing a Hybrid Active Directory (AD) Infrastructure

Arguably one of the most important tasks is to ensure that your hybrid identity infrastructure is properly secured using feature-rich tools, rigid controls with consistent configurations, and solid processes and procedures to ensure a high level of security.

In this chapter, we will learn how to apply appropriate layers of security to protect Active Directory (AD) domain controllers against attack, while allowing for continued productivity and secure workloads. We will also learn how to manage protected users and the delegation of privileges and administrators, secure the administrative workflows and authentications of and to domain controllers, and successfully implement and manage Microsoft Defender for Identity. In this chapter, we will cover the following topics:

  • Technical requirements and lab setup
  • Managing password policies
  • Configuring and managing account and user security
  • Securing domain controllers...