Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By : Chris Gill
Book Image

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801

By: Chris Gill

Overview of this book

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career. With this book, you’ll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you’ll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server. You’ll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You’ll also learn how to monitor and troubleshoot Windows Server environments. By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.
Table of Contents (31 chapters)
1
Part 1: Exam Overview and the Current State of On-Premises, Hybrid, and Cloud Workflows
3
Part 2: Secure Windows Server On-Premises and Hybrid Infrastructures
9
Part 3: Implement and Manage Windows Server High Availability
13
Part 4: Implement Disaster Recovery
17
Part 5: Migrate Servers and Workloads
23
Part 6: Monitor and Troubleshoot Windows Server Environments

Implementing domain isolation

IT pros and network administrators are most likely familiar with the concept and application of network isolation, where networks have unlimited physical and logical network segmentation or micro-segmentation. There are a variety of reasons to do this, and a few examples include attempting to keep traffic localized to devices for speed and efficiency and it being a great way to increase network security.

Within a Windows Server-based networking environment, you can achieve isolation between server and domain resources, thus limiting access to authorized and authenticated computers to prevent unauthorized devices from gaining access to server and domain resources. The design of this approach typically includes a network with a firewall and connection security policies that ensure expected traffic and authentication requests are allowed while unexpected or unsolicited traffic is dropped or rejected by both the firewall and the configured connection security...