Algemeen Flashcards

1
Q

Cmdlet for provisioninig new virtual machine

A

Via Powershell New-AzVM (NOT create-AzVM)
Via Azure CLI az vm create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Configuring linux machines at first boot after provisioning (f.i. installing packages, writing files, injecting certificates)

A

Use cloud-init. This only works on Linux VMs, and requires that the VM is created via the Azure CLI with az vm create. Use the – custom-date parameter to provide the cloud-init config file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Powershell modules

A

For Powershell use AZ module: Azure Powershell, a collection of powershell modules. The AzureRM module is deprecated.

For other shells use Azure CLI.

Azure Cloud Shell is a hosted Azure shell environment on an Ubuntu container, offering both Azure CLI over bash or Azure Powershell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organization of resources

A

A management group contains many subscriptions or other management groups contains many resource groups. Subs and management groups must trust the same AD tenant.
Each tenant has a root management group, other groups may be nested below this group. Between root and subscription level up to six levels. At each level, groups can contain subscriptions.
Bij default no-one has permissions on the root management group, but global administrators can elevate themselves to User Access Administrator on the root mg and assign other permissions to everyone on everything.
Policy assignments and role assignments cascade down. Allowed resource type policy has the implied effect of denying all non-named resources.
Tags can be assigned to resources, but do not inherit inside resource groups or subscriptions.
Resource groups have an associated location, but can contain resources from all location. Their location only determines where the rg metadata is stored. Moving a resource to a different rg does not change its location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Conditional access

A

AD policies applied after first factor authentication. Signals are used as input, which can include user/group, device, IP/location, which application is being accessed, device/platform. Based on the signals rules can be defined that either:
- grant controls: block access, or require specific options, such as: MFA, device being marked as compliant or joined, authentication strength, password change.
- session controls: enabled limited session functionality in the accessed application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enabling MFA on Azure AD.

A

Use MFA configuration page to enable per user.

Basic through security defaults which enabled several policies, such as: for all users of administrators MFA, all users must register for MFA, block legacy authentication, MFA when privileged operations. Included in the free tier.
For more granular controls, use conditional access, which requires a paid Azure AD license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Upload on-premise vhd to Azure storage account

A

Add-AzVhd cmdlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static IP VM

A

Set-AzureStaticVNetIP is for legacy
Set-AzNetworkInterface is new

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VM availability?

A

Availability set: logical grouping: allocated so they don’t share same fault domains, within one datacenter. Less latency than availability zones. No extra cost. Configure with platformFaultDomainCount to 1, 2, or 3 (default of 3 if not specified), to choose how many different fault domains, depends on region. Configure with platformUpdateDomainCount up to 20 (default 5), to choose how many update domains. If 1 fault domain, then only one update domain allowed.

To resize with change of physical hardware required, first stop vms in the set.
Availability zones: three per region in supported regions, no extra cost, seperate datacenters. No extra cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network security groups

A

Layer 4 filtering rules going from 5-tuple to allow/deny. Assigned at the NIC or subnet level.

If multiple nsgs apply, they are processed in order. Both must allow!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service tags

A

A service tag represents a group of IP address prefixes from a given Azure service. Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Azure Backup Instant Restore

A

Snapshot of VM files, retained locally for several days (default 2, configurable). Recovery to any existing VM in the same subscription at file level.

Means less downtime during a restore because no WAN traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Collect and analyze performance metrics and logs in Azure

A

Azure Monitor, which builds on top of Azure Log Analytics, the platform service that gathers log and metrics data from all your resources. The basic building block is a workspace, which lives in one region.

Azure Monitor is the tool to get the data from the Azure resources, and Log Analytics is the tool to query that data if you want to query over multiple resources.

Insights is a curated list of pre-prepared queries, visualizations, and dashboards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Azure VM backup, which configs/states supported

A

Supports backing up the entire VM. Support for VMs that are running or shutdown/offline, Linux distros endorsed bij Azure, all Windows Server since 2008, all personal Windows since Windows 10. Only 64-bit OS-es.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Automated user adding

A

Powershell:
- New-AzureADUser cmdlet creates native user in the AD
- New-AzureADMSInvitation creates an invitation for an external user

Portal:
- Bulk create for native from csv

  • Bulk invite for external from csv, required fields:
    Email address to invite - the user who will receive an invitation
    Redirection url - the URL to which the invited user is forwarded after accepting the invitation.
  • Bulk add from csv, required fields:
    Name
    Upn
    Initpasswd
    Block Signin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AKS (Azure Kubernetes Services)

A

Managed Kubernetes cluster. Control plane is created automatically and managed by Azure; no user access. Only pay for the nodes running in the cluster. Each node is a VM, created from image Ubuntu Linux, Azure Linux, or Windows Server 2019. Nodes are grouped in node pools. Nodes run pods that are often 1:1 with containers, but can contain multiple containers.
The cluster is created in a resource group, and creates a node resource group automatically that contains all the node resources, such as VMs, storage and Vnet. This can’t be an existing resource group, name cannot be changed, it must be in the same subscription. Automatically deleted when cluster resource is deleted.
Resources are logically grouped into namespaces, by default there are three: default, kube-system, kube-public. Users can only interact with resources within their assigned namespaces.
Permissions through Kubernetes roles (Kubernetes RBAC), that grant (not deny) permissions. Then assign roles to users through RoleBindings. Users must come from external identity solution, for AKS this is Azure AD. It is also possible to use Azure RBAC.
Azure AD authentication is provided to AKS clusters with OpenID Connect, an identity layer built on top of the OAuth 2.0 protocol. Previously OAuth2 client and server applications had to be configured in the AD tenant, now this is deprecated and managed Azure integration by the cluster is the default, this means creating or updating the cluster with –enable-aad option.

If using Kubnetes Networking then pods receive an IP address from logically different address space to the Azure Virtual Network Subnet and NAT is then used to translate IPs from the PODs to the Azure virtual Network. If using Azure Container Networking Interface (ACNI) then all PODs get IP from the subnet and can be accessed directly.

To support node pools for Windows containers you need to use a network policy that uses Azure CNI, not kubenet. To pull images from ACR you must enable AKS-managed Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Office 365 groups

A

With Microsoft 365 Groups, you can give a group of people access to a collection of shared resources. Unlike regular groups they support automatic deletion after a certain time period.

These groups cannot be members of other groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Moving resources to another subscription

A

Possible for Vnets, Storage accounts, Vms with associated disks, recovery services vaults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Powershell subscription cmdlets

A

New/Get/Set/Remove-AzApiManagementSubscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Accept or reject legal terms for marketplace item programmatically

A

Set-AzMarketplaceTerms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IT Service Management Connector (ITSMC)

A

The IT Service Management Connector (ITSMC) allows you to connect Azure and a supported IT Service Management (ITSM) product/service, such as the
Microsoft System Center Service Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Local administrators on Azure joined devices

A

When you connect a Windows device with Azure AD using an Azure AD join, Azure AD adds the following security principles to the local administrators group on the device:
✑ The Azure AD global administrator role
✑ The Azure AD device administrator role
✑ The user performing the Azure AD join

Configure device administrator role members (also) through the devices blade (requires premium tenant).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud Device Administrator AD role

A

Can perform certain administrative functions on devices, such as removing, enabling or disabling, but cannot change group membership or any other device properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Deleting resource group

A

Deleting rg deletes all resources contained in it. Running or stopped vms, dbs or storage accounts do not block deletion. Backup recovery vaults that contain data cannot be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Network contributor

A

Lets you manage networks, but not access to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Contributor

A

Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Security admin/reader AD roles

A

These deal with administrating security policies and information, not with ad role assignments or rbac assignments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DNS records to verify custom domain name for Azure AD or App service

A

MX or TXT for AD
CNAME and TXT for App Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Azure log analytics queries

A

Own query language, no powershell or sql syntax

Chain operations with |

Searchbased query:
search in (<table>) “keyword” finds all records where any column contains keyword

Table based query:

<table> | <nextoperation>

where clauses use ==, and, or
search “keyword”

project selects colums to include

All keywords are lowercase
</nextoperation></table>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ARM zones parameter

A

1,2 or 3: which zone to place vm in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Managed disk

A

A vhd on a paged blob (inside a storage container?) inside a storage account, but all abstracted away by Azure. Now first-class citizen with granular access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Storage concepts

A

Top-level storage account, can contain file shares, queues, tables or storage containers, which contain blobs, and are namespace levels. Root container $root must be explictely created, lives at the namespace root.
Storage account worldwide unique, only lowercase and numbers, 3-24 characters.
Storage is always encrypted.

For block blobs only there is data access tiering: hot/cool/cold/archive (no zone redundancy). While a blob is in the archive tier, it can’t be read or modified. To read or download a blob in the archive tier, you must first rehydrate it to an online tier, either hot, cool, or cold.
For standard File shares only there is transaction optimized (default), hot, or cool tiers.

File share tier is per file share, independent of the storage account default blob access tier.

Azure files: network file shares, accessible through either SMB or NFS. Standard (HDD) or Premium (SSD). NFS only on premium. Premium File Shares only on FileStorage type.
Azure tables: key/value store, no schema
Azure blob: unstructured data storage, block, page (used for disk), append. Tiering only for block blobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Custom role definition - AssignableScopes

A

The AssignableScopes property specifies the scopes (root, management group, subscriptions, or resource groups) where a role definition can be assigned.
Root = / (only for built-in roles)
Subscriptions = /subscriptions/{subscriptionId1}
RG = /subscriptions/{subscriptionId1}/resourceGroups/{rgname}
Management group= /providers/Microsoft.Management/managementGroups/{groupId1} (only one allowed)

Wildcards are NOT possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Load balancer types

A

Internal load balancer - network layer
Public load balancer - network layer
Traffic manager - DNS based solution for public facing applications
Azure application gateway - application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Editing properties of on-premise synced users

A

You must use Windows Server Active Directory to update the identity, contact info, or job info for users whose source of authority is Windows Server Active Directory.
UsageLocation is an Azure attribute so can be edited from AzureAD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Managed identity

A

Managed identities provide an automatically managed identity in Microsoft Entra ID for applications to use when connecting to resources that support Microsoft Entra authentication. Applications can use managed identities to obtain Microsoft Entra tokens without having to manage any credentials.

Disabled by default.

Two types:
- System-assigned. Some resources allow this to be enabled directly on the resource. For example f.i. Vm.
- User-assigned. You create a managed identity as a standalone Azure resource, and assign it to one or more Azure Resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

IAAS

A

Azure is responsible for storage, networking, compute, fabric (=hypervisor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Paas

A

Azure is responsible for everything needed for me to run my application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Resource locks

A

Locks an Azure subscription, resource group, or resource to protect them from accidental user deletions and modifications. The lock overrides any user permissions.
You can set locks that prevent either deletions or modifications. In the portal, these locks are called Delete and Read-only. In the command line, these locks are called CanNotDelete and ReadOnly.

Are inherited down to the contained resources, most restrictive lock takes precedence.

Cannot be assigned to management groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Share-level permissions on Azure file shares

A

With on-premise AD DS authentication, the share-level permission is configured against the identity represented in Microsoft Entra ID, whereas the directory/file-level permission is enforced with that in AD DS. Domain joined computers authenticate against both the on-prem DC for a Kerberos ticket, and the Azure AD. So, only hybrid users.

With Azure AD domain services authentication both hybrid and cloud-only users, because Azure runs a DC that is synced from Azure AD automatically. Clients must be domain joined to that hosted domain.

With Azure AD Kerberis authentication only hybrid identities.

Not supported for NFS, not for computer accounts because they are not synched to Azure AD. For computer accounts default share-level permissions can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Tags

A

To subs, rgs and resources, not to mgs. Don’t inherit.

You can have write access to the Microsoft.Resources/tags resource type. This access lets you tag any resource, even if you don’t have access to the resource itself. The Tag Contributor role grants this access.

Or you can have write access to the resource itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Bulk delete users

A

To perform a bulk delete of users in Azure Active Directory, you need to create and upload a CSV file that contains the list of users to be deleted. The file should include the user principal name (UPN) of each user only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Role to enable traffic analytics on a subscription

A

To enable Traffic Analytics for an Azure subscription, you must have one of the following Azure roles at the subscription scope: - Owner - Contributor - Network Contributor These roles have the nece

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Administrative units

A

Administrative units restrict permissions in a role to any portion of your organization that you define.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Permission to log onto a virtual machine in a custom role definition

A

The log-in action is a DataAction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Policies assignment and exclusion scopes

A

Assignment from root management group down to resource
Exclusion one level lower than scope, root mg not possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Custom role from clone

A

Use existing built-in or custom role as starting point. Must be the same type (AD / RBAC), and built-in AD roles cannot be cloned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Service tags

A

Service tags represent a group of IP addresses associated with Azure PaaS and SaaS services, can be used in Network Security Groups.

49
Q

AD group licensing

A

AD licenses can be assigned to both users and groups, but group nesting is not supported: only first-level members of the group will receive the license. Only security groups or M365 groups for which securityEnabled=TRUE, mail-enabled no problem.
If assigned a license through a group the license cannot be removed from individual users, but the user can always be deleted. Also additional licenses can directily be assigned to the user. A group with a license assigned can not be deleted.

50
Q

Role assignable groups

A

Only for new groups they can be configured to allow AD roles to be assigned to them. If this happens, any member of the group receives the role. The role-assignable property is immutable. The group must be of type assigned, not dynamic, M365 and security groups are supported. Group nesting is not supported: a group can’t be added as a member of role-assignable group.

51
Q

Private endpoint

A

A private endpoint uses a private IP address from your VNet, effectively bringing a Azure service (the private link resource) such as Azure Storage or SQL into your VNet. Any traffic between your virtual machine and the service will traverse over the VNet and stay on the Microsoft backbone network, without ever leaving it.

The private endpoint must be deployed in the same region and subscription as the virtual network.

Azure Monitor private links are structured differently from private links to other services you might use. Instead of creating multiple private links, one for each resource the virtual network connects to, Azure Monitor uses a single private link connection, from the virtual network to an AMPLS. AMPLS is the set of all Azure Monitor resources to which a virtual network connects through a private link.

52
Q

Service endpoints

A

Service Endpoints work by enabling a subnet on your virtual network to support Service Endpoints. When Service Endpoints are enabled, the PaaS resource sees traffic coming from your VNETs private IP, not its public IP. Another advantage of using service endpoints is that traffic is routed to the Azure resources optimally, over the Microsoft backbone.

This means you can now configure your PaaS resource to only accept traffic from those subnets. There is no requirement to do any IP filtering or NAT translation; you tell the PaaS resource which VNET and Subnet to allow traffic from.

Virtual Network service endpoint policies allow you to filter egress virtual network traffic to Azure Storage accounts over a service endpoint, and allow access to only specific Azure Storage accounts. Endpoint policy is configured on a subnet in a virtual network. Service endpoints for Azure Storage should be enabled on the subnet to apply the policy. Virtual networks must be in the same region as the service endpoint policy. By default, if no policies are attached to a subnet with endpoints, you can access all storage accounts in the service. Once a policy is configured on that subnet, only the resources specified in the policy can be accessed from compute instances in that subnet. Access to all other storage accounts is denied.

53
Q

Co-administrator

A

Co-administrators have full access to all resources in a subscription, including the ability to create, read, update, and delete resources. Legacy role, deprecated.

Can only be assigned at the subscription level.

54
Q

Azure Import/Export

A

Azure Import/Export service is used to securely import/export large amounts of data to Azure Blob storage and Azure Files by shipping disk drives to an Azure datacenter.

Azure Import/Export supports the following storage types:
✑ Import supports Azure Blob storage and Azure File storage
✑ Export supports Azure Blob storage

55
Q

Storage account types

A

The different storage account options are:

✑ General-purpose v2 (GPv2) accounts are storage accounts that support all of the latest features for tiering and redundancy.

GPTv2 is standard, there are also premium account types:
✑ BlockBlob premium storage accounts are limited to supporting only block and append blobs. No tiering, no regional redundancy.
✑ FileStorage. Only Azure Files, only Premium, so only type to support NFS.

Legacy:
✑ General-purpose v1 (GPv1) accounts provide access to all Azure Storage services, but may not have the latest features or the lowest per gigabyte pricing. No data tiering. No zone redundancy.
✑ Blobstorage accounts support all the same blob features as GPv2, but are limited to supporting only block and append blobs. No zone redundancy.

56
Q

Deploying Azure File Sync

A

Step 0 - Deploy the Azure Storage Sync Service to Azure
Step 1 - Install the Azure File Sync agent on Server1. The Azure File Sync agent is a downloadable package that enables Windows Server to be synced with an Azure file share
Step 2 - Register Server1. Register Windows Server with Storage Sync Service. Registering your Windows Server with a Storage Sync Service establishes a trust relationship between your server (or cluster) and the Storage Sync Service.
Step 3 - Create a sync group and a cloud endpoint.
Step 4 - Create a server endpoint.

A sync group defines the sync topology for a set of files. Endpoints within a sync group are kept in sync with each other. A sync group must contain one cloud endpoint, which represents an Azure file share and one or more server endpoints. A server endpoint represents a path on registered server. A sync group can only have server endpoint per registered server, a registered server can have multiple server endpoints in different sync groups if their paths don’t overlap.

57
Q

Azure Import steps

A

Step 1: Prepare the drives (Attach an external disk to Server1 and then run waimportexport.exe). Before running configure dataset.csv and driveset.csv in the root folder of the tool.

Step 2: Create an import job (From the Azure portal, create an import job) Step 3: Ship the drives to the Azure datacenter (Detach the external disks from Server1 and ship the disks to an Azure data center) Step 4: Update the job with tracking information (From the Azure portal, update the import job)

58
Q

UNC path for file shares

A

\<storage>>.file.core.windows.net\<file></file></storage>

59
Q

Azcopy

A

AzCopy is a command line utility that you can use to copy blobs or files to or from a storage account. AzCopy is a CLI cmdlet, so will work on all operating systems.

Authentication for blob with sas or azure ad, for file share with sas. No access keys!

Azcopy make - creates blob container or file share

60
Q

Azure file sync syncing

A

Endpoints within a sync group are kept in sync with each other.

Azure Files doesn’t have change notification or journaling yet, so Azure File Sync has a scheduled job called a change detection job. This job is initiated every 24 hours. That means that if you change a file in the Azure file share, you might not see the change on the on-premises file share for up to 24 hours. Changes on the on-premises server are replicated immediately.

When there is a naming conflict all files are preserved. The most recently written change keeps the original file name. The older file (determined by LastWriteTime) has the endpoint name and the conflict number appended to the filename. For server endpoints, the endpoint name is the name of the server. For cloud endpoints, the endpoint name is Cloud.

61
Q

Azure file sync cloud tiering

A

When enabled, this feature stores only frequently accessed (hot) files on your local server. Infrequently accessed (cool) files are split into namespace (file and folder structure) and file content. The namespace is stored locally and the file content stored in an Azure file share in the cloud.
When a user opens a tiered file, Azure File Sync seamlessly recalls the file data from the Azure file share.

The volume free space policy tells Azure File Sync to tier cool files to the cloud when a certain amount of space is taken up on your local disk. With the date policy, cool files are tiered to the cloud if they haven’t been accessed (read or written to) for x number of days.

62
Q

Converting storage redundancy levels

A

Regional on/off through portal
Zonal on/off through ms support or sometimes user initiated request

One step at a time

63
Q

Storage container access

A

Each storage has a public ip, by default accessible by all.

Storage firewall protects access to that public endpoint, not private endpoints. The process of approving the creation of a private endpoint grants implicit access to traffic from the subnet that hosts the private endpoint. Service endpoints access the public ip, so are covered by the firewall. Turn it on, then enable public address ranges and vnets for access.

Trusted Microsoft services such as backup can be always granted access with an option.

Network rules don’t affect virtual machine (VM) disk traffic, including mount and unmount operations and disk I/O.

After network access regular RBAC authorization checks apply.

64
Q

Deleting backup vault

A

First deregister servers, then delete data, wait for soft delete to expire.

65
Q

Azure backup

A

Organized in vault resources. These are storage entities in Azure that house data. The resource being backed-up must be in the same region, no restrictions on resource group.

Storage redundancy can be local, zone or geo-redundant. Two types of vault:
- Recovery services vault: is a management entity that stores recovery points that are created over time, and it provides an interface to perform backup-related operations. Supports SQL, VMs, Azure Files.
- Backup vault: supports PostgreSQL, block blobs and managed disks. This is ‘operational’ backup, meaning that backups are snapshot-based and the data is stored in the storage account, so follows the redundancy of the storage account.

Multi-user authentication (MUA): Azure Backup uses the Resource Guard as an additional authorization mechanism for a Recovery Services vault or a Backup vault. Therefore, to perform a critical operation (described below) successfully, you must have sufficient permissions on the associated Resource Guard as well.

66
Q

Azure backup reports to log analytics

A

The location and subscription of the Log Analytics workspaces is independent of the location and subscription where your vaults exist.

67
Q

Azure storage account keys

A

When you create a storage account, Azure generates two 512-bit storage account access keys for that account. These keys can be used to authorize access to data in your storage account via Shared Key authorization, or via SAS tokens that are signed with the shared key.

Storage account access keys provide full access to the configuration of a storage account, as well as the data. SAS (Shared Access Signatures) tokens provide more limited scope of access, and are signed with the storage account keys.

Remember: net use can’t utilize SAS token, only access key.

68
Q

Azure Storage lifecycle management

A

Azure Storage lifecycle management offers a rule-based policy that you can use to transition blob data to the appropriate access tiers or to expire data at the end of the data lifecycle.

If you define more than one action on the same blob, lifecycle management applies the least expensive action to the blob.

Supported for block and append blob in gpv2 and blobstorage, premium block blobstorage (no tiering).

Only delete is supported for append blob, set tier isn’t supported.

69
Q

SMB port

A

445

70
Q

Object replication for blobs

A

Object replication asynchronously copies block blobs between a source storage account and a destination account.

Object replication requires that the following Azure Storage features are also enabled: change feed on the source account, blob versioning on both accounts.

Both the source and destination accounts must be either general-purpose v2 or premium block blob accounts. Object replication supports block blobs only; append blobs and page blobs aren’t supported.

71
Q

Encryption Scope

A

By default, a storage account is encrypted with a key that is scoped to the entire storage account. When you define an encryption scope, you specify a key that may be scoped to a container or an individual blob.

72
Q

SMB Multichannel

A

Requires premium file share, so in a FileStorage account type.

73
Q

RBAC assignment conditions

A

A condition is an additional check that you can optionally add to your role assignment to provide more fine-grained access control.

For storage, only supported by containers and queues.

74
Q

Storage account encryption

A

Data in your storage account is automatically encrypted by Azure Storage. Azure Storage encryption offers two options for managing encryption keys at the level of the storage account:
- Microsoft-managed keys. By default, Microsoft manages the keys used to encrypt your storage account.
- Customer-managed keys. You can optionally choose to manage encryption keys for your storage account. Customer-managed keys must be stored in Azure Key Vault.
Switching between these models is always supported.

By default, Queue storage and Table storage use an own
key that is scoped to the service and managed by Microsoft. To use customer managed keys for them, you must configure that the account key is also used for these services. This setting cannot be changed after storage account creation. Blob storage and Azure Files always use the account encryption key to encrypt data.

When infrastructure encryption is enabled, data in a storage account is encrypted twice — once at the service level and once at the infrastructure level — with two different encryption algorithms and two different keys. The storage account must be of type general-purpose v2 or premium block blob. Infrastructure encryption cannot be enabled or disabled after the account has been created.

75
Q

Azure Key Vault supprted keys

A

RSA 2048,3192,4096

76
Q

Azure Disk Encryption

A

Azure Disk Encryption (ADE) encrypts the OS and data disks of Azure virtual machines (VMs) inside your VMs by using the DM-Crypt feature of Linux or the BitLocker feature of Windows. ADE is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets.

Creating and configuring a key vault for use with Azure Disk Encryption involves three steps:

1.Creating a key vault.
2. Setting key vault advanced access policies to ‘Enable access to Azure Disk Encryption for volume encryption’. The Azure platform needs access to the encryption keys or secrets in your key vault to make them available to the VM for booting and decrypting the volumes.
3. (Optional) Set up a key encryption key (KEK). Azure Disk Encryption uses BitLocker for Windows VMs, which requires a key for encrypting the data disk. If you’re using a KEK, the BEK (BitLocker Encryption Key) will be wrapped by this KEK before writing it to the vault.

Azure Key Vault key auto-rotation isn’t currently compatible with Azure Disk Encryption.

77
Q

Azure Data Lake Storage

A

Azure Data Lake Storage requires a hierarchical namespace to support its features.

78
Q

Blob versioning and snapshots

A

You can enable Blob storage versioning to automatically maintain previous versions of an object. When blob versioning is enabled, you can access earlier versions of a blob to recover your data if it’s modified or deleted. Blob versions are immutable. You can’t modify the content or metadata of an existing blob version.

Blob versioning is available for standard general-purpose v2, premium block blob, and legacy Blob storage accounts.

A blob snapshot is a read-only copy of a blob that’s taken at a specific point in time. Blob snapshots and blob versions are similar, but a snapshot is created manually by you or your application, while a blob version is created automatically on a write or delete operation when blob versioning is enabled for your storage account.

79
Q

prefixMatch

A

Includes containername

80
Q

Blob RBAC permissions

A

Control-plane permissions such as contributor, storage account contributor or reader do not grant access to the blob data, only management operations on the container or metadata of the blob.

Data-plane permissions such as Storage blob data contributor are required for data access.

Anonymous blob access can be configured at the container level.

81
Q

Creating AKS with CLI

A
  1. az aks create
    Manage cluster with kubectl, install locally with az aks install-cli. First download credentials to kubectl with
  2. az aks get-credentials
    Deployments of pods are configured with YAML manifest files.
  3. Kubectl apply -f file.yaml
82
Q

Monitoring inside VMs

A

Azure Monitor Agent (AMA) collects monitoring data from the guest operating system of Azure and hybrid virtual machines and delivers it to Azure Monitor. Azure Monitor Agent uses data collection rules, where you define which data you want each agent to collect. It is an Azure VM extension, can be used on both Windows and Azure.

Other extension that does the same is Diagnostic extension (LAD for Linux, WAD for Windows), can only be enabled only on VMs that reside within Azure. Microsoft Monitoring Agent cannot be installed as an extension.

83
Q

Moving vm between vnets and subscriptions, changing size

A

Not possible. Delete vm (not resources), create vm in dest vnet.

You can change the Subnet a VM is connected to after it’s created, but you cannot change the VNet.

When you move a virtual machine from one subscription to another, you need to ensure that all the dependent resources are also moved along with it.

While resizing the VM it must be in a stopped state, or Azure will restart the vm.

84
Q

Web app on App Service

A

The region in which your app runs is the region of the App Service plan it’s in.

App Service also supports running both Windows and Linux containers.

Using virtual network integration for your web app enables your app to access resources in the virtual network you’re integrated with and resources in virtual networks peered to the virtual network your app is integrated with including global peering connections. Vnet from same region are supported.

Requires empty subnet in the vnet.

The virtual network integration feature is used in Azure App Service dedicated compute pricing tiers (basic and up). If your app is in an App Service Environment (isolated tiers), it’s already integrated with a virtual network and doesn’t require you to configure virtual network integration feature to reach resources in the same virtual network.

It doesn’t grant inbound private access to your app from the virtual network, and so nsgs don’t apply to inbound traffic. Use private endpoint for that.

85
Q

Installing extra components on new windows vms

A

The Custom Script Extension downloads and executes scripts on Azure VMs. This extension is useful for post deployment configuration, software installation, or any other configuration / management task. Integrates with ARM templates. Add the extension with the extensionprofile section.

86
Q

App service tiers

A

Free, Shared, Basic, Standard, Premium, Isolated. Increasing tier is called scaling up the app service.

Staging slots supported on Standard/Premium/Isolated.

Only standard and higher supports automatic scale-up.

87
Q

Availability of VM scale sets

A

A regional (non-zonal) scale set uses placement groups, which act as an implicit availability set with five fault domains and five update domains. Scale sets of more than 100 VMs span multiple placement groups.

88
Q

Redeploy VM

A

When you redeploy a VM, Azure will shut down the VM, move the VM to a new node within the Azure infrastructure, and then power it back on, retaining all your configuration options and associated resources.

89
Q

VM quotas

A

Quota is calculated based on the total number of cores in use both allocated and deallocated.

90
Q

VM Scale Set orchestration modes

A

Scale set orchestration modes allow you to have greater control over how virtual machine instances are managed by the scale set. The orchestration mode is defined when you create the scale set and cannot be changed or updated later.

In flexible orchestration mode (old name: VM), you manually create and add a virtual machine of any configuration to the scale set. You can add the virtual machine to a scale set in the same region, zone, and resource group.

In uniform orchestration mode (old name: SCALESETVM), you define a virtual machine model and Azure will generate identical instances based on that model. This is the default.

91
Q

Alert rate limiting

A

The rate limit thresholds are: ✑ SMS: No more than 1 SMS every 5 minutes. ✑ Voice: No more than 1 Voice call every 5 minutes. ✑ Email: No more than 100 emails in an hour. ✑ Other actions are not rate limited.

92
Q

AKS autoscaling

A

AKS clusters can scale in one of two ways:

  • The cluster autoscaler watches for pods that can’t be scheduled on nodes because of resource constraints. The cluster then automatically increases the number of nodes. It also regularly checks nodes for a lack of running pods and scales down the number of nodes as needed.
  • The horizontal pod autoscaler uses the Metrics Server in a Kubernetes cluster to monitor the resource demand of pods. If an application needs more resources, the number of pods is automatically increased to meet the demand.

The cluster autoscaler works at the Kubernetes level and is configured with Azure tooling:
az aks create/update
–enable-cluster-autoscaler \
–min-count 1 \
–max-count 3

Set-AzAksCluster

The horizontal pod autoscaler works within Kubernetes and is configured with kubectl.

93
Q

Azure proximity placement groups

A

To achieve co-location of your Azure Infrastructure as a Service (IaaS) resources and low network latency among them. When you assign your virtual machines to a proximity placement group, the virtual machines are placed in the same data center, resulting in lower and deterministic latency for your applications.

Ppg must be in the same region as the resources.

94
Q

New VM disk configuration

A

In Azure, every VM – regardless if Linux or Windows – gets a temporary disk assigned automatically. This temporary disk is located on the physical server (the hypervisor) where the Azure VM is hosted and is non-persistent. Disks used by the operating system or additionally added data disks are persistent disks and stored in Azure Storage.

The temporary storage will be lost on a reboot, move, resize, redeploy, etc.

For Windows Server, the temporary disk is mounted as D:. Linux based VM’s have the temporary disk mounted as “/dev/sdb1”.

95
Q

VM Scale Set Automatic Image Upgrades

A

With automatic OS image upgrades the latest OS image published by image publishers is automatically applied to the scale set without user intervention. Works for all VM sizes, and for both Windows and Linux images.

The OS Disk of a VM is replaced with the new OS Disk created with latest image version. Configured extensions and custom data scripts are run, while persisted data disks are retained.

Upgrades take place in batches, with no more than 20% of the scale set upgrading at any time.

To configure automatic OS image upgrade, ensure that the upgradePolicy->automaticOSUpgradePolicy.enableAutomaticOSUpgrade property is set to true in the scale set model definition.

For scale sets using Windows virtual machines, the property virtualMachineProfile.osProfile.windowsConfiguration.enableAutomaticUpdates property must set to false in the scale set model definition. The enableAutomaticUpdates property enables in-VM patching where “Windows Update” applies operating system patches without replacing the OS disk. With automatic OS image upgrades enabled on your scale set, an extra patching process through Windows Update is not required.

Don’t confuse with upgradePolicy->mode, which can be automatic or manual and configures automatic application of changes to the VM model (f.i. VM size).

96
Q

Azure Backup and restore for VMs

A
  1. Azure Backup starts a backup job according to the backup schedule you specify. Enhanced policy required for Trusted Launch VM or multiple backups per day.
  2. During the first backup, a backup extension is installed on the VM if the VM is running (VMSnapshot / VMSnapshotLinux).
  3. Backup takes a snapshot and sends it to the vault (recovery point). For Windows VMs, the Backup service coordinates with VSS to take an app-consistent snapshot of the VM disks.

Backups of disks are parallel and incremental.

Azure Backup provides several ways to restore a VM:
- Create a new VM. The new VM must be created in the same region as the source VM.
- Restore a VM disk, which can then be used to create a new VM, or can be attached to a different VM. The restore job generates a template that you can download and use to specify custom VM settings, and create a VM.
- You can restore a disk, and use it to replace a disk on the existing VM. Replace existing is supported for unencrypted managed VMs, it is unsupported for classic VMs and unmanaged VMs. This requires the VM to be shutdown during the restore.
- You can restore individual files and folders from an Azure VM Backup by downloading a script that mounts the recovery point as a network drive. This script can be run on machines in- and outside of Azure.

If you’re restoring VMs from a single vault, use different general-purpose v2 storage accounts per vm to ensure that the target storage account doesn’t get throttled.

Azure Backup uses the MARS agent to back up files, folders, and system state from on-premises machines and Azure VMs. The Microsoft Azure Recovery Services (MARS) agent is also known as the Azure Backup agent.
Generally, you back up an Azure VM by using an Azure Backup extension on the VM. This method backs up the entire VM. If you want to back up specific files and folders on the VM, install and use the MARS agent alongside the extension.

To restore data, you use the Recover Data wizard in the MARS Agent. You can:
- Restore data to the same machine from which the backups were taken.
- Restore data to an alternate machine.

97
Q

Vm and vnets and nsg and vnic

A

Must all be in the same region

98
Q

Powershell deploying ARM template

A

You can target your deployment to a resource group, subscription, management group, or tenant. Depending on the scope of the deployment, you use different commands.
- To deploy to a tenant, use New-AzTenantDeployment.
- To deploy to a management group, use New-AzManagementGroupDeployment.
- To deploy to a subscription, use New-AzSubscriptionDeployment which is an alias of the New-AzDeployment cmdlet. For subscription level deployments, you must provide a location for the deployment. The location of the deployment is separate from the location of the resources you deploy. The deployment location specifies where to store deployment data.
- To deploy to a resource group, use New-AzResourceGroupDeployment.

Parameter -Mode specifies the deployment mode:
- Complete: In complete mode, Resource Manager deletes resources that exist in the resource group but are not specified in the template.
- Incremental: In incremental mode, Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.

99
Q

App service backups

A

There are two types of backups in App Service. Automatic backups are made for your app regularly as long as it’s in a supported pricing tier. Custom backups require initial configuration, and can be made on-demand or on a schedule. Exclude files with a _backup.filter file.

Retention of automatic backups is 30 days, not configurable, for custom 0-30 days or indefintrle.

Automatic backups do not require customer storage, custom backups require a storage account.

100
Q

Azure Container Group

A

The top-level resource in Azure Container Instances is the container group. A container group is a collection of containers that get scheduled on the same host machine. The containers in a container group share a lifecycle, resources, local network, and storage volumes.

Multi-container groups currently support only Linux containers. For Windows containers, Azure Container Instances only supports deployment of a single container instance.

Within a container group, container instances can reach each other via localhost on any port, even if those ports aren’t exposed externally on the group’s IP address or from the container.

101
Q

Public IP addresses

A

Public IP addresses allow Internet resources to communicate inbound to Azure resources. You dedicate the address to the resource until you unassign it. A resource without a public IP assigned can communicate outbound.

Public IPs are region specific and can’t be moved between regions.

Standard or basic. Standard is always static, basic is dynamic for ipv6 and static/dynamic for ipv4. Standard supports zone redundancy and cross-region load balancers (use global tier), basic does not.

Standard IP is closed for inbound traffic by default and requires NSG to accept traffic.

102
Q

Azure Firewall

A

Supports only Standard IP4, no IP6 or basic.

The firewall, VNet, and the public IP address all must be in the same resource group.

103
Q

Azure Compute Gallery

A

If you have a large number of images that you need to maintain, and would like to make them available throughout your company, you can use an Azure Compute Gallery as a repository.

Images are grouped under definitions with multiple versions per definition. The metadata of an image definition is descriptive and doesn’t constrain the image you can use.

104
Q

Azure Container Apps

A

Azure Container Apps allows you to run containerized applications without worrying about orchestration or infrastructure. It is based on Kubernetes. It only supports Linux images.

ACA is more app-centric and provides a simpler and more serverless experience than AKS, abstracting away the Kubernetes cluster.

105
Q

Service principals for resources

A

For resources, there are two ways to obtain a service principal:

  1. (Recommended) enable a system-assigned managed identity for the application. With managed identity, Azure internally manages the application’s service principal and automatically authenticates the application with other Azure services. Applications can use managed identities to obtain Microsoft Entra tokens without having to manage any credentials. There are two variants: system-assigned (tied to the resource), or user-assigned (created by user, can be assigned to multiple resources).
  2. Register an application with the Azure AD tenant.
106
Q

Authentication for Key Vault

A

Entra authenticates a security principal (user/group or service) and then Key Vault checks if the security principal has the necessary permission for requested operation.

Data plane access is granted through RBAC or vault access policy (legacy).

App service certificates support only access policies.

107
Q

Azure Load Balancer

A

Layer 4 load balancer that distributes inbound traffic to backend pool instances. The backend pool instances can be Azure Virtual Machines or instances in a Virtual Machine Scale Set.

The backend pool defines the group of resources that will serve traffic for a given load-balancing rule.

Public Load Balancers are used to load balance internet traffic to your VMs, and provide outbound Internet access.

Azure Internal/Private Load Balancer (ILB) provides network load balancing between virtual machines that reside inside a cloud service or a virtual network with a regional scope.

When the load balancer’s health probe indicates a healthy back-end endpoint, backend instances are available to receive new traffic flows.

Load balancer rules that apply to all ports and protocols are called HA ports.

Floating IP allows the reuse of the same backend port across multiple rules.

Basic and Standard SKUs are supported. Basic load balancer doesn’t support HTTPS health probes or zones or diagnostics in Azure Monitor, or HA rules, backend pools must be virtual machines in a single availability set or virtual machine scale set.

For Standard the backend instances must be on the same vnet. Virtual machines must have a standard SKU public IP or no public IP.

108
Q

Private DNS zone

A

To resolve the records of a private DNS zone from your virtual network, you must link the virtual network with the zone. Linked virtual networks have full access and can resolve all DNS records published in the private zone. You can also enable autoregistration on a virtual network link. When you enable autoregistration on a virtual network link, the DNS records for the virtual machines in that virtual network are registered in the private zone.

A specific virtual network can be linked to only one private zone if automatic registration of VM DNS records is enabled. Reverse DNS works only for private IP space in the linked virtual network.

DNS zone is a global resource.

109
Q

Peering vnets

A

Virtual network peering enables you to connect virtual networks in the same region and across regions. The virtual networks can be in the same, or different subscriptions. When you peer virtual networks in different subscriptions, both subscriptions can be associated to the same or different Microsoft Entra tenant.

The traffic between virtual machines in peered virtual networks uses the Microsoft backbone infrastructure.

Peerings by themselves aren’t transitive.

Gateway transit is a peering property that lets one virtual network use the VPN gateway in the peered virtual network for cross-premises or VNet-to-VNet connectivity.

[obsolete] You can’t add address ranges to, or delete address ranges from a virtual network’s address space once a virtual network is peered with another virtual network.
To add or remove address ranges, delete the peering, add or remove the address ranges, then re-create the peering.

You can now add or remove address spaces without having to remove the peering first and re-establishing the peering. You can simply add the address space in VNET1 and perform a resync using Powershell with Sync-AzVirtualNetworkPeering

To resolve peering status Disconnected, delete the peering from both virtual networks, and then re-create them.

110
Q

Migrating private DNS zone to Azure DNS

A

Use CLI: az network dns zone import -g <resource> -n <zone> -f <zone></zone></zone></resource>

111
Q

Application Security Group

A

An application security group is a logical collection of virtual machines (NICs). You join virtual machines to the application security group, and then use the application security group as a source or destination in NSG rules. The Networking blade of virtual machine properties has a new button called Configure The Application Security Groups for each NIC in the virtual machine. If you click this button, a pop-up blade will appear and you can select which (none, one, many) application security groups that this NIC should join, and then click Save to commit the change.

112
Q

Azure VPN Gateway

A

The virtual network gateway uses specific subnet called the gateway subnet. The gateway subnet contains the IP addresses that the virtual network gateway resources and services use. It requires a free subnet range within the VNET of the gateway. All gateway subnets must be named ‘GatewaySubnet’ to work properly, and only one per vnet.

When working with gateway subnets, avoid associating a network security group (NSG) to the gateway subnet.

The local network gateway is a specific object that represents your on-premises location (the site) for routing purposes. You give the site a name by which Azure can refer to it, then specify the IP address of the on-premises VPN device to which you’ll create a connection. You also specify the IP address prefixes that will be routed through the VPN gateway to the VPN device.

Create a site-to-site VPN connection between your virtual network gateway and your on-premises VPN device.

VNet-to-VNet

Configuring a VNet-to-VNet connection is a simple way to connect VNets. When you connect a virtual network to another virtual network with a VNet-to-VNet connection type (VNet2VNet), it’s similar to creating a Site-to-Site IPsec connection to an on-premises location. Both connection types use a VPN gateway, so require a vpn gateway subnet.

Several SKUs, you can’t choose the Basic SKU from the portal. BasicSKU cannot coexist with ExpressRoute.

A P2S connection requires a RouteBased VPN type, PolicyBased not supported.

113
Q

Network Watcher

A

Azure Network Watcher provides a suite of tools to monitor, diagnose, view metrics, and enable or disable logs for Azure IaaS (Infrastructure-as-a-Service) resources. Network Watcher enables you to monitor and repair the network health of IaaS products. Network Watcher isn’t designed or intended for PaaS monitoring or Web analytics.

When you create or update a virtual network in your subscription, Network Watcher is automatically enabled in your virtual network’s region.

Network Watcher consists of three major sets of tools and capabilities:
1. Monitoring
2. Network diagnostic tools
3. Traffic

NSG flow logging requires the Microsoft.Insights provider, the flow logs are stored in a storage account.

Specific tools:

  • IP flow verify checks if a packet is allowed or denied to or from a virtual machine. The information consists of direction, protocol, local IP, remote IP, local port, and a remote port. If the packet is denied by a security group, the name of the rule that denied the packet is returned.
  • NSG Flow logs enable you to log 5-tuple flow information about your Azure IP traffic that passes through a network security group or Azure virtual network. This data can be used by Traffic Analytics to analyze network traffic in your environment.
  • Connection Troubleshoot. The connection troubleshoot feature of Network Watcher provides the capability for a one-time check a direct TCP connection from a virtual machine to a virtual machine (VM), fully qualified domain name (FQDN), URI, or IPv4 address.
  • The connection monitor capability monitors communication at a regular interval and informs you of reachability, latency, and network topology changes between the VM and the endpoint over a period of time. You can select only the source VMs that are created in the region of the connection monitor.
  • Variable packet capture allows you to create packet capture sessions to track traffic to and from a virtual machine or a scale set.
  • Network Performance Monitor - for latency and network issues in hybrid, on-premises, across environments setups.
114
Q

Azure Bastion

A

Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal, or via the native SSH or RDP client already installed on your local computer. The Azure Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network.

To associate a virtual network with a Bastion, it must contain a subnet with name AzureBastionSubnet and a prefix of at least /26.

Bastion always requires a Standard public static IPv4, Regional, not Global Tier.

Basic SKU: 2 instances (50 connections at most) Standard SKU: you can specify the number of instances between 2-50 (25 connections by instance at most). One IP required on the Bastion subnet per instance.

Bastion inbound traffic is on port 443, it communicates from its subnet to the VMs on port 22 (Linux) or port 3389 (Windows).

The native client feature lets you connect to your target VMs with native ssh and rdp clients from your machine via Bastion using Azure CLI, and expands your sign-in options to include local SSH key pair and Azure Active Directory (Azure AD). Using the native client requires the Standard SKU tier for Azure Bastion. Connect from Azure CLI with az network bastion rdp.

Azure Bastion and VNet peering can be used together. When VNet peering is configured, you don’t have to deploy Azure Bastion in each peered VNet. This means if you have an Azure Bastion host configured in one virtual network (VNet), it can be used to connect to VMs deployed in a peered VNet without deploying an additional bastion host.

115
Q

Networking policies AKS

A

Azure Network Policies supports Azure CNI only. Calico Network Policies supports both Azure CNI (Windows Server 2019 and Linux) and kubenet (Linux).

116
Q

Routing table

A

Assigned to a subnet, applies to all outbound traffic from that subnet.

117
Q

SSPR for administrators

A

By default, administrator accounts are enabled for self-service password reset, and a strong default two-gate password reset policy is enforced. This policy may be different from the one you have defined for your users, and this policy can’t be changed. With a two-gate policy, administrators don’t have the ability to use security questions.

118
Q

Multi-step web test

A

Application Insights

119
Q

Data collection rule

A

Only source vm, only dest log analytics