CONTENTS
Cover
Acknowledgments
About the Author
Introduction
Chapter 1 The Cloud and Microsoft Azure Fundamentals
The Evolution of the Datacenter
Microsoft Azure 101
Getting Access to Microsoft Azure
Reserved Instances and Azure Hybrid Benefit
Increasing Azure Limits
The Azure Portal
Chapter 2 Governance
What Is Governance?
Understanding Governance Requirements in Your Organization
Azure Subscriptions and Management Groups
Resource Groups
Role-Based Access Control
Naming Conventions
Using Tags
Azure Policy
Azure Templates
Azure Blueprints
Azure Resource Graph
Cost Management
Chapter 3 Identity
The Importance of Identity
A Brief Refresher on Active Directory
Using Cloud Services, Federation, and Cloud Authentication
Azure Active Directory Fundamentals
Chapter 4 Identity Security and Extended Identity Services
Azure AD Security
Azure AD B2C
Active Directory in the Cloud
Chapter 5 Networking
Connectivity
Protection
Delivery
Monitoring
Chapter 6 Storage
Azure Storage Services
Storage with Azure VMs
Bulk Data Options
Azure Database Offerings
Chapter 7 Azure Compute
Virtual Machines
Platform as a Service Offerings
Chapter 8 Azure Stack
Azure Stack Foundation
Managing Azure Stack
Understanding Azure Stack HCI
Chapter 9 Backup, High Availability, Disaster Recovery, and Migration
Availability 101
Backups in Azure
High Availability in Azure
Disaster Recovery in Azure
Migrating Workloads to Azure
Chapter 10 Monitoring and Security
Azure Monitoring
Security in Azure
Chapter 11 Managing Azure
Command Line, Scripting, and Automation with Azure
Deploying Resources with ARM JSON Templates
Additional Useful Technologies for Azure Management
Chapter 12 What to Do Next
Understanding and Addressing Azure Barriers
Why You Should Use Azure and Getting Started
Index
End User License Agreement
List of Tables
Chapter 1
Table 1.1
Chapter 3
Table 3.1
Chapter 6
Table 6.1
Chapter 7
Table 7.1
Chapter 8
Table 8.1
Chapter 11
Table 11.1
List of Illustrations
Chapter 1
Figure 1.1 The three axes of datacenter planning
Figure 1.2 A high-level view of a virtualization host and resources assigned to virtual ma...
Figure 1.3 The key types of highly variable workloads that are a great fit for consumption...
Figure 1.4 The responsibility levels for different types of “as a Service”
Figure 1.5 A more detailed view of responsibilities for different PaaS offerings
Figure 1.6 Various types of Pizza as a Service
Figure 1.7 Scale out vs. scale up
Figure 1.8 Example availability set deployment
Figure 1.9 Availability zone architecture
Figure 1.10 Resilient service using multiple constructs
Figure 1.11 Regional network gateway architecture
Figure 1.12 An old view of available Azure services
Figure 1.13 How resource providers fit in the Azure Resource Manager architecture
Figure 1.14 Viewing the resource providers via the Resource Explorer
Figure 1.15 Viewing billing information for Azure subscriptions
Figure 1.16 The hierarchy when using an enterprise enrollment
Figure 1.17 Possible methodologies for enterprise enrollment account setup
Figure 1.18 A simple RI example
Figure 1.19 A more complex RI example using instance size flexibility
Figure 1.20 Enabling Azure Hybrid Benefit for an existing VM
Figure 1.21 The prompt to create a free account when your identity has no access to Azure s...
Figure 1.22 The Azure portal structure
Figure 1.23 Using the navigation tree in the portal
Figure 1.24 The Azure portal command bar
Figure 1.25 Customizing a dashboard
Figure 1.26 Viewing shared dashboards
Chapter 2
Figure 2.1 Basic Compliance Manager dashboard
Figure 2.2 Tracking customer-managed controls
Figure 2.3 Moving a subscription to a new Azure AD tenant
Figure 2.4 An example management group hierarchy
Figure 2.5 Common ID between the root management group and the Azure AD tenant
Figure 2.6 Enabling access for all subscriptions and management groups under the Azure AD ...
Figure 2.7 The wonderous things you can do with your new management group
Figure 2.8 Accessing the properties of a management group
Figure 2.9 Viewing the roles available for assignment at a resource group level, and then ...
Figure 2.10 A slightly modified icon for a custom role
Figure 2.11 Switching to PIM-based role resource management.
Figure 2.12 Changing the scope for Azure PIM role assignment.
Figure 2.13 Whiteboarding output of tags taxonomy discussion
Figure 2.14 How governance and policy fits into the core of Azure Resource Manager
Figure 2.15 Overview page of Policy
Figure 2.16 Assigning a policy
Figure 2.17 Definition configuration as part of initiative
Figure 2.18 A simple blueprint
Figure 2.19 Assigning a blueprint to a subscription
Figure 2.20 The cost optimization cycle
Figure 2.21 Basic cost analysis with resources grouped by type
Figure 2.22 Adding a new filter
Figure 2.23 Changing the type of chart
Figure 2.24 Creating a budget
Figure 2.25 Viewing advisor cost recommendations
Figure 2.26 VM recommendation options
Chapter 3
Figure 3.1 SAML flow for federation
Figure 3.2 Simple token flow
Figure 3.3 More advanced token flow
Figure 3.4 Viewing some of the built-in federated applications
Figure 3.5 Creating a new Azure AD instance
Figure 3.6 Some architectural elements of Azure AD
Figure 3.7 Matching ImmutableID to ObjectGUID
Figure 3.8 Replicating objects to different AAD instances
Figure 3.9 A custom domain as the primary domain for my Azure AD instance
Figure 3.10 The Microsoft 365 admin center shows details on directory sync
Figure 3.11 The connector accounts used by Azure AD Connect
Figure 3.12 Filtering the objects that will replicate to Azure AD
Figure 3.13 Viewing basic Azure AD Connect status
Figure 3.14 Azure AD Connect Health information for Azure AD Connect
Figure 3.15 Azure AD Connect Health information for AD DS
Figure 3.16 Third-party inbound provisioning to Azure AD
Figure 3.17 Overview of Azure AD B2B
Figure 3.18 OTP usage flow
Figure 3.19 Enabling OTPs
Figure 3.20 High-level flow of pass-through authentication
Figure 3.21 High-level flow of federated authentication
Figure 3.22 Modified token flow with federation in the picture
Figure 3.23 Computer account in AD representing Azure AD
Figure 3.24 Required configuration for Seamless Sign-on
Figure 3.25 Enabling Enterprise State Roaming
Figure 3.26 A simple dynamic group rule
Figure 3.27 User vs. Group Management Properties
Figure 3.28 Adding an application to Azure AD tenant
Figure 3.29 User settings related to enterprise application
Figure 3.30 User vs. admin consent scopes
Figure 3.31 Example MyApps portal experience
Figure 3.32 MyApps browser extension providing easy access to applications
Chapter 4
Figure 4.1 Using an OATH token
Figure 4.2 User Security Info interface
Figure 4.3 Using password reset registration requirements
Figure 4.4 The building blocks of conditional access
Figure 4.5 Forcing re-registration of MFA
Figure 4.6 Diagnostic settings for Azure AD
Figure 4.7 Some of the information available via Log Analytics views
Figure 4.8 Change the resource filter to apply ARM roles at different resource levels
Figure 4.9 An example timeline of activities detected by Azure ATP
Figure 4.10 Basic Azure AD Application Proxy flow
Figure 4.11 Adding identity providers for a B2C instance
Chapter 5
Figure 5.1 Viewing the address space for virtual subnets
Figure 5.2 A public IP address in East US
Figure 5.3 The non-transitive nature of network peering
Figure 5.4 ExpressRoute high-level view
Figure 5.5 Route exchange with BGP
Figure 5.6 Example route filter
Figure 5.7 An example Azure Virtual WAN deployment
Figure 5.8 Traffic control can be achieved using network security groups.
Figure 5.9 Possible NVA deployment with load balancers
Figure 5.10 Traffic flow with NAT
Figure 5.11 Components used with Application Gateway
Figure 5.12 Example Traffic Manager usage scenario
Figure 5.13 High-level Azure Front Door architecture
Figure 5.14 Split TCP detail
Chapter 6
Figure 6.1 Azure Storage architecture and its interaction with Azure compute services
Figure 6.2 An example Azure Storage account showing many of the key attributes
Figure 6.3 Displaying the access keys for a storage account
Figure 6.4 Portal screen for creating a SAS
Figure 6.5 Blob storage pricing
Figure 6.6 Blobs in different access tiers
Figure 6.7 An example Azure table
Figure 6.8 The computer account for the storage account in my managed AAD DS instance
Figure 6.9 Restore options for a file restore
Figure 6.10 Endpoint cloud tiering options
Figure 6.11 Replication of data in a sync group
Figure 6.12 The storage of an Azure VM
Figure 6.13 Availability sets with aligned managed disks
Figure 6.14 Consistency models in Cosmos DB
Chapter 7
Figure 7.1 The layers for IaaS
Figure 7.2 Key cost considerations for on premises and Azure
Figure 7.3 B series credits consumed
Figure 7.4 B series credits remaining
Figure 7.5 Quick Run command options for a VM
Figure 7.6 Boot diagnostics console screenshot
Figure 7.7 Traditional virtualization-hosting applications vs. applications running in con...
Figure 7.8 Windows Server containers vs. Hyper-V isolation containers
Figure 7.9 Container architecture with Docker
Figure 7.10 Applications and deployment slots in an App Service plan
Chapter 8
Figure 8.1 Registered applications during the Azure Stack deployment to Azure AD
Figure 8.2 Using the Admin portal Marketplace management
Figure 8.3 Azure Stack’s update experience
Figure 8.4 The Azure Stack HCI stack
Chapter 9
Figure 9.1 A very simple application architecture
Figure 9.2 Architecture extended to have the frontend in two regions
Figure 9.3 Architecture with a replica in Region 2 of the database for DR purposes only
Figure 9.4 Architecture using the replica for read operations
Figure 9.5 Architecture using Cosmos DB
Figure 9.6 Retention policy in Azure Backup
Figure 9.7 Disaster recovery on premises
Figure 9.8 Disaster recovery on premises to Azure
Figure 9.9 Disaster recovery for Azure to Azure
Chapter 10
Figure 10.1 Monitoring relationships in Azure
Figure 10.2 Viewing metrics for a VM
Figure 10.3 Service Health information in Azure Monitor
Figure 10.4 Diagnostic setting configuration
Figure 10.5 Example blob created as part of diagnostic setting sink to storage
Figure 10.6 Configuring data to collect via connected sources
Figure 10.7 Viewing the schema of a workspace
Figure 10.8 Searching available monitoring solutions
Figure 10.9 Action options in an action group
Figure 10.10 Sources of alerts in Azure
Figure 10.11 Signals available for a resource
Figure 10.12 Metric using dynamic thresholds
Figure 10.13 Alert rules generated across possible sources
Figure 10.14 Alert rules based on Log Analytics queries
Figure 10.15 Action rule filters
Figure 10.16 Viewing alerts with smart groups
Figure 10.17 Viewing threats for Azure SQL database
Figure 10.18 Viewing threats through a query in Log Analytics
Figure 10.19 The overall security state for my subscription and actionable recommendations
Figure 10.20 Enabling access via JIT for my machine
Figure 10.21 Security cases in Azure Sentinel
Figure 10.22 An application using its managed identity to gain access to a secret, which is ...
Chapter 11
Figure 11.1 Opening the JSON settings file
Figure 11.2 Performing an interactive logon via a browser
Figure 11.3 Accessing the Cloud Shell
Figure 11.4 Setting up advanced cloud drive options
Figure 11.5 Viewing the $PSVersionTable information for a Cloud Shell instance
Figure 11.6 An included example runbook
Figure 11.7 Permissions for the created Run As account
Figure 11.8 Working with credential assets
Figure 11.9 Creating a new function with PowerShell as an option
Figure 11.10 Testing a function
Figure 11.11 Viewing the template that will be used to create resources authored in the port...
Figure 11.12 Azure ARM JSON template editing IntelliSense in action
Figure 11.13 Enabling the use of a key vault’s contents for template deployments
Figure 11.14 A very simple release pipeline that consists of a single task for the release: ...
Figure 11.15 Using the Cloud Shell within the Azure application
Figure 11.16 Connecting to my VM via the bastion host service
Figure 11.17 Managing S2D with Windows Admin Center from the browser
Chapter 12
Figure 12.1 Elements and perceived possible vulnerabilities for a public cloud service
Figure 12.2 Gartner Methodologies and Magic Quadrant
Figure 12.3 Gartner Methodologies and Hype Cycle
Guide
Cover
Table of Contents
Introduction
Pages
iii
iv
v
vii
ix
xix
xx
xxi
xxii
xxiii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
415
416
417
418
419
420
421
422
423
424
425