Copyrighted Material
Total Page:16
File Type:pdf, Size:1020Kb
Index Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. A advanced rules for Azure AD groups, 138 authentication AAD Connect (Azure AD Connect), 112–120, Advanced Threat Analytics (ATA), 158 Azure AD, 110, 128 113, 116–118, 120–121, 131 Advanced Threat Protection (ATP), 158, 1599, AD-joined machines, 136–137 abuse of cloud services, 403–404 350–352, 352 cloud, 129–130 accelerated networking, 177 agents confi guration selection, 134 access panel in Azure AD, 143 backups, 309–310 hybrid, 130–134, 131–133 access reviews in Azure AD, 108 federations, 98 single sign-on, 134–136, 135–136 Access Token Lifetime property, 364 VMs, 258–260, 259 Azure Stack, 281–282 access tokens (ATs), 103, 103 Windows fi le server, 233 cloud, 101–103, 102–103 Account icon, 45 alerts multifactor. See multifactor authentication accountability in cost management, 91–92, action groups, 342–343, 342 (MFA) 92–93 action rules, 349, 349 Authentication Service, 110 accounts cost, 92 authorization, cloud, 101–103, 102–103 break glass, 119 creating, 344–348, 345–348 automation hijacking, 405–406 smart groups, 349–350, 350 alerts, 341 Run As, 377–378, 378 sources, 343, 344 Azure Automation, 376–380 storage targeting, 341–342 Automation Runbook action group, 92 Azure Monitor, 333, 333 altsecid attribute, 125 autonomous system (AS), 1877, 187 Azure Storage, 215–216 antivirus function in VM Agent, 259 autonomous system numbers (ASNs), 1877, 187 Azure Storage keys, 219–220, API apps application services, 278 availability. See high availability (HA) 2199, 221 App Service Environment (ASE), availability sets acquisitions, workload migration for, 319 196, 278 high availability, 311 ACS (Azure Container Service), 275 App Service plans, 275–278, 277 managed disks, 240 action groups append blobs, 223 proximity placement groups, 262 alerts, 342–343, 342 Append effects in Azure Policy, 77 resiliency, 20–22, 21, 23, 239, 240 budgets, 92 Application Insights, 329, 339–341 availability zones (AZs) action rules for alerts, 349, 349 Application Map, 329, 340 high availability, 311 actions, custom, 370 Application Proxy, 140, 158–160, 159 managed disks, 239, 240 Active Directory (AD) Application Proxy Connectors, 159–160, 159 proximity placement groups, 262 AD-joined machines, 136–137 application security groups, 196–199, 197 resiliency, 22, 23 Azure. See Azure AD Application/Service pattern for AzCopy, 224 capabilities, 977–98 subscriptions, 54 Azure AD in cloud, 162–163 applications Application Proxy, 140, 158–160, 159 domain controller considerations, Azure AD, 140–142, 141–142 applications, 140–142, 141–142 165–167 conditional access, 151 authentication, 128 domain controller placement, 164–165 on-premises disaster recovery, 313 AD-joined machines, 136–137 Domain Services, 1677–169 user experience, 142–144, 143–144 cloud, 129–130 site confi guration, 163–164 archive tier for blob storage, 225 confi guration selection, 134 Enterprise Admin accounts, 115 Archive to a storage account option, 154 hybrid, 130–134, 131–133 Active Directory Authentication Library ARM. See Azure Resource Manager (ARM) single sign-on, 134–136, 135–136 (ADAP), 160 AS (autonomous system), 1877, 187 Azure Stack authentication, 281–282, 283 Active Directory Federation Services (AD FS), ASE (App Service Environment), 196, 278 B2B, 122–128, 123, 1277–128 99, 104, 105 ASNs (autonomous system numbers), B2C security, 160–162, 161 activity logs, 328 COPYRIGHTED1877, 187 MATERIALCloud App Discovery, 403 AD. See Active Directory (AD) ASR (Azure Site Recovery), 314–317 Connect Health, 119–120, 120–121 AD FS (Active Directory Federation Services), assertions in SAML, 100 Domain Services, 1677–169 99, 104, 105 assessment phase in workload migration, entitlements, 138–139, 139 AD-joined machines, 136–137 321–322 fundamentals, 103–104, 105 ADAP (Active Directory Authentication ATA (Advanced Threat Analytics), 158 groups, 1377–138, 138 Library), 160 ATP (Advanced Threat Protection), 158, 1599, Identity Protection, 153–154 Add-AzAccount cmdlet, 362 350–352, 352 monitoring with, 3277–328 Add-AzureRmAccount cmdlet, 377 ATs (access tokens), 103, 103 multifactor authentication, 145–149, admin consent in Azure AD, 142, 142 Audit effects in Azure Policy, 76 146–148 administrators, RODC rights, 167 audit logs, 154 obtaining, 109–110, 109–110 Advanced Data Security, 351 auditIfNotExists effects in Azure Policy, 76 populating, 108–110, 109–110 bindex.indd 1:58:34:PM/09/18/2019 Page 415 416 | AZURE AD CONNECT • BACKUPS Privileged Identity Management, 156–158, Azure Functions role-based access control, 64 157 alerts, 343 templates. See JSON (JavaScript Object provisioning to, 121–122, 122 automating with, 376–377 Notation) replicating to, 111–119, 113–114, 116–118 cost management, 92 Azure Security Center (ASC), 79, 351, SKUs, 106–108 description, 279 353–355, 354 user experience, 142–144, 143–144 overview, 380–383, 381–382 Azure Sentinel, 155, 355–3577, 356 user roles, 144 Azure Hybrid Benefi t, 39–40, 39 Azure Service Manager (ASM) Azure AD Connect (AAD Connect), 112–120, Azure Identity Converter, 112 vs. ARM, 40 113, 116–118, 120–121, 131 Azure Import/Export, 242 replacement, 26 Azure AD Connect Health, 119–120, 120–121 Azure Key Vault, 3577–358, 358, 378 Azure Site Recovery (ASR), 314–317 Azure AD Global Admin accounts, 115 Azure Kubernetes Service (AKS), 275 Azure SQL ATP, 351, 352 Azure AD Privileged Identity Management - Azure Load Balancer, 203–204 Azure SQL Database, 243–245 Azure Resources, 68 AZURE_LOADBALANCER tag, 198 Azure Stack Azure Advisor, 94 Azure Migrate, 321–322 Azure Stack HCI, 296, 296 Azure Application Gateway Azure Monitor interacting with, 288–290 high availability, 311 alerts, 344 marketplace syndication, 290–292, 291 overview, 204–206, 205 cost management, 92 offers, 292–294 Azure Application Services Event Hub, 333 overview, 281–284, 283 App Service plans, 275–278, 277 fundamentals, 329–331, 330–332 plans, 292–294 environments, 278 Log Analytics, 333–334 privileged endpoint and support session functions, 279 storage accounts, 333, 333 tokens, 295 Logic Apps, 279 Azure Monitor Logs, 329 purchasing, 285–287 serverless, 278–279 alerts, 347–348 services, 284–285 Azure Automation, 376–380 Application Insights, 339–341 subscriptions, 292–294 Azure Backup, 232, 3077–310, 308 Azure Network Watcher, 338–339 updating, 294, 295 Azure Backup Server (ABS), 310 description, 334 uses, 2877–288 Azure Bastion host, 393–394, 395 monitoring solutions, 3377, 338 Azure Stack Development Kit (ASDK), Azure blog, 413 workspaces 287, 289 Azure Blueprints, 76, 76 data, 334–335, 335 Azure Stack HCI, 296, 296 Azure Cloud Shell querying, 336–3377, 336 Azure Storage ATP, 351 Azure portal, 44 Azure NetApp Files, 228 Azure Storage Explorer, 223 for management, 393, 393 Azure Network Watcher, 338–339 Azure Storage services, 213 working with, 371–376, 372–373 Azure Networking blog, 413 architecture, 213–215 Azure Compute Units (ACUs), 257 Azure overview Azure Files, 2277–234, 231–234 Azure Container Instances (ACI), 274 access, 30 Azure Queues, 227 Azure Container Service (ACS), 275 enterprise enrollments, 33–377, 34, 36 Azure Tables, 226, 227 Azure Cosmos DB, 24, 246–2477, 2477, free trials and Pay-as-You-Go, 31 blob storage, 221–226 304, 305 Visual Studio subscriptions, 31–33 replication, 2177–218 Azure Cost Management (ACM), Azure Hybrid Benefi t, 39–40, 39 storage account keys, 219–220, 89–91 Azure portal, 41–46, 42–44, 46 2199, 221 Azure Data Box, 242 Azure Resource Manager, 26–30, 277, 29 storage accounts, 215–216 Azure Data Box Disk, 242 datacenters, 15 Azure Tables, 226, 227 Azure Data Box Edge, 242–243, 296 limits, 40–41 Azure Traffi c Manager, 23, 206–208, 206 Azure Data Box Gateway, 242–243 Microsoft network, 24–26, 26 Azure Virtual WAN, 193–194, 194 Azure Data Box Heavy, 242 money buckets, 31 Azure VM documentation, 413 Azure Disk Encryption, 259, 407 regions and clouds, 16–18 AzureStackStampInformation.json fi le, Azure DNS confi guration options, reserved instances, 37–39, 38 289, 295 1777–178 resiliency, 18–24, 199, 21, 23–24 Azure Drive, 374 servers, 14–15 Azure Event Hub, 333 Azure Policy, 75–80, 76–78, 80 B Azure Files, 2277–228 Azure portal, 41 B2B. See business-to-business (B2B) in Azure Azure File Sync, 232–234, 233–234, basics, 42–45, 42–44 AD 310 dashboards, 45–46, 46 B2C (Business to Consumer) security, backups, 310 description, 359 160–162, 161 permissions, 229 Azure Queues, 227 backups security, 229–232, 231 Azure Resource Graph, 76, 76, 86–88 Azure Backup, 3077–310, 308 snapshots and backups, 232, 232 Azure Resource Manager (ARM) Azure Files, 232, 232 Azure Firewall, 199 vs. ASM, 40 considerations, 305–307 Azure Front Door, 23–24, 24 Azure Policy, 76, 76 importance, 406 multi-region application deployments, overview, 26–30, 277, 29 overview, 297–298 302–303, 304 Privileged Identity Management, 157, 157 VM Agent, 259 working with, 208–210, 209–210 resource groups, 62 Windows Admin Center, 397 bindex.indd 1:58:34:PM/09/18/2019 Page 416 BARRIERS TO AZURE • CUSTOMIZATION IN AZURE STACK | 417 barriers to Azure Cloud Drive, 374 ExpressRoute Global Reach, 193–194, 194 overview, 399–400 cloud endpoints, 233 gateways and coexistence, 191–192 risks. See risks cloud overview, 16–18 PaaS VNet integration, 194–196 trust building, 400 datacenter evolution, 1–2 user-defi ned routing and forced tunneling, Basic Load Balancer, 204 introduction, 2–4, 3 192–193 best effort vs. reliability, 21 private, 4–6, 4 virtual networks