| 
 
| 課程名稱:Microsoft Certified Windows Server Hybrid Administrator Associate (2科 Windows Server 2025) 國際認可證書課程 (Fast Track) - 簡稱:Windows Server 2025 Training Course (Fast Track) (提供 7x24 實習器材)
 |  
 AZ-800  Administering Windows Server Hybrid Core Infrastructure (42 hrs) 1. Configuring DHCP Server Role1.1 DHCP Client and Server interaction
 1.2 Installing DHCP Server Role
 1.3 DHCP Scope
 1.4 DHCP Address Exclusion Range
 1.5 DHCP Reservation
 1.6 Conflict Address Detection
 1.7 DHCP Policy Based Assignment (PBA) with User Classes
 1.7.1 To create a User Class
 1.7.2 To use a User Class
 1.8 DHCP Server Network Binding
 2. Configuring a Windows Server Router2.1 Two Router Forms
 2.1.1 Hardware Routers
 2.1.2 Software Routers
 2.2 Routing in Windows Server
 2.2.1 To set the default gateway or DC1 and KV1
 2.2.2 Enable Routing Service on WS1
 2.3 DHCP Relay (接力) Agent (代理人)
 2.3.1 Configure a new scope for the network 20.0.0.0 in the DHCP server in DC1
 2.3.2 Configure WS1 as a DHCP Relay Agent
 2.4 New Client-Side features
 2.4.1 New DHCP Client-side features in the Windows 10 April 2018 Update
 2.4.2 New DHCP Client-side features in the Windows 10 May 2020 Update
 3. Roaming VPN to On-Premises Network3.1 Configuring VPN
 3.2 Deploying VPN Connections using CMAK
 3.3 PPTP and L2TP
 4. Basic Concept of Storage Virtualization4.1 Concepts of Storage Pool, Virtual Disk, and Storage Virtualization in Windows Server
 4.1.1 Storage Pool
 4.1.2 Virtual Disk
 4.1.3 Volume
 4.2 Configuring a Storage Pool
 4.3 Configuring a Virtual Disk
 4.3.1 Creating a Simple Virtual Disk
 4.3.2 Creating a Mirrored Virtual Disk
 4.3.3 Creating a Parity Virtual Disk
 4.4 Redundancy of Virtual Disks
 4.5 Maintaining Storage Pool
 4.6 Repairing a Storage Pool automatically using Hot Spare disks
 5. Advanced Concepts of Storage Virtualization5.1 Introduction to Tiered Storage Pool
 5.2 Configuring a Tiered Storage Pool
 5.3 Pinning files to specific storage tier
 5.4 Storage Tiers Optimization Task
 5.5 Dual Parity Non-Tiered Virtual Disks
 6. Basic Concepts of Internet SCSI6.1 Introduction to SCSI and Internet SCSI
 6.2 Configuring iSCSI Portal
 6.3 Configuring iSCSI Targets
 6.4 Configuring iSCSI Initiator
 7. NTFS Permissions7.1 Standard NTFS Permissions on Folders and Files
 7.2 Taking Ownership (擁有權) of Folders and Files
 7.3 Giving Users the Ability to Take Ownership
 7.4 To Take (取得) Ownership
 7.5 More About Taking Ownership
 8. Share Permissions8.1 Configuring Share Permissions
 8.2 Access-Based Enumeration (ABE)
 8.3 Combining Share Permissions and NTFS Permissions
 8.4 Access-Denied Assistance
 9. File Server Resource Manager9.1 Introduction to FSRM
 9.2 File Server Resource Manager in Quota Management
 9.2.1 Quota Templates and standard Quota
 9.2.2 Storage Reports Management
 9.2.3 Auto Apply Quotas
 9.3 File Screening
 9.3.1 Create Screening Template
 9.3.2 Create File Screens
 9.4 File Management Tasks
 9.4.1 Creating a File Expiration Task
 10. Storage in Azure Cloud10.1 Creating a Free Azure account
 10.1.1 Services included in Azure Free account
 10.1.2 Setting up a Free Account
 10.2 Storage Account Endpoints
 10.2.1 About Require Secure Transfer
 10.3 Creating a GPv2 Storage Account
 10.4 Introduction to Azure Files
 10.5 Data Access Method of Azure Files
 10.6 Creating Azure File Share
 10.7 Mounting Azure Files
 10.8 Azure File Sync
 10.8.1 Terminology
 10.8.2 Preparing Windows Server
 10.8.3 Installing the Azure File Sync Agent
 10.8.4 Installing “Az” PowerShell Module
 10.8.5 Deploying the Azure File Sync Service
 10.8.6 Server Registration
 10.8.7 Create a sync group and a cloud endpoint
 10.8.8 Creating Server Endpoint
 10.9 Cloud Tiering
 10.9.1 How Cloud Tiering works
 10.9.2 Cloud Tiering Policy
 10.9.3 Configuring Cloud Tiering
 10.9.4 Forcing Recall of a File or Directory
 10.9.5 Unregistering server and removing the Sync Group
 11. Windows Server Role11.1 Domain Controller (DC, 網域控制器)
 11.2 Member Server (成員伺服器)
 11.3 The Kerberos Authentication Protocol
 11.3.1 Understanding Kerberos concepts
 11.3.2 Default Kerberos Policy
 12. Creating and Managing User Accounts12.1 To Create Domain User Accounts
 12.2 Deleting and Renaming User Accounts
 13. Concept of Groups (群組)13.1 Global Groups (全域群組)
 13.2 Local Groups (本機群組)
 13.3 General Usage (普遍用法) of a Global Group and a Local Group
 13.3.1 Team-up (組合) domain user accounts by a Global Group (請於家中進行)
 13.3.2 Assign (指定) permissions to a Local Group (請於家中進行)
 13.3.3 Add (加入) the Global Group as a member of Local Group
 13.4 Some Built-in (內置) Global Groups
 13.5 Some Built-in (內置) Local Groups
 13.6 Domain Local Groups (網域本機群組)
 13.6.1 General Usage (普遍用法) of a Global Group and a Domain Local Group
 13.6.2 Some Built-in (內置) Domain Local Groups
 13.6.3 Built-in System Groups
 13.7 Local User Accounts
 13.8 Domain User Accounts
 13.9 Built-in (內置) Local User Accounts
 13.10 Some Built-in Domain User Accounts
 14. Concept of Active Directory14.1 Logical Structure (企業組織架構)
 14.1.1 Domains
 14.1.2 Trees (樹)
 14.1.3 Forests (森林)
 14.1.4 Organizational Unit (OU, 組織單位)
 14.2 Physical Structure (企業地理結構)
 15. Concepts of Windows Policy (原則)15.1 Local Computer Policy
 15.1.1 Add the Snap-in (加插工具) “Local Computer Policy” to the MMC (請於家中進行)
 15.1.2 Edit a Local Computer Policy Setting (請於家中進行)
 15.2 Site, Domain or OU Policy
 15.3 Priority of Windows Policies:
 15.4 Important Facts and Rules of Group Policy
 15.5 Refresh Interval for Group Policy
 15.6 Group Policy Security Filter
 15.7 Group Policy Administrative Templates
 15.8 ADMX Central Store
 15.8.1 To create the central store:-
 15.8.2 Adding Custom ADMX Templates
 15.8.3 Benefits of storing ADMX files in Central Store (SYSVOL)
 15.9 Group Policy Startup Script
 15.10 Group Policy Slow-link detection
 16. Domain Functional Level (DFL)16.1 Understanding AD DS Domain Function Levels
 16.2 Supported Domain Functional Level and Features by Windows Server
 16.3 Group Types of Active Directory
 16.3.1 Security Group
 16.3.2 Distribution Group
 16.4 Scopes (範圍) of Security Group
 16.4.1 Domain Local Group
 16.4.2 Global Group
 16.4.3 Universal Group (通用群組)
 16.5 Common Usage (普遍用法) of Global Group, Universal Group and Local Group
 16.6 Creation of a Group
 16.7 Raise Domain Functional Level
 16.8 Rollback Options of Domain Functional Level (Optional Knowledge)
 16.9 Using Fine-Grained Password and Lockout Policy
 16.10 Preparation
 16.11 Creating Password Setting Objects by using ADSI Editor and ADAC
 16.12 Apply PSOs to Users or Global Groups
 16.12.1 Viewing Resultant PSO
 16.12.2 The logic behind precedence: calculating RSOP
 16.12.3 Scenario I: Using PSO after Upgrading to Windows Server 2016
 16.12.4 Scenario II: Migrating to Windows Server with PSO support
 17. Forest Functional Level17.1 Forest Functional Levels available in Windows Server
 17.2 Guidelines for raising Forest Functional Level
 18. Active Directory Recycle Bin18.1 About deleted Active Directory Objects
 18.2 Overview of Restoring Active Directory objects by Recycle Bin
 18.3 Enabling the Active Directory Recycle Bin
 18.4 LDAP Names
 18.5 Restoring Active Directory Objects
 18.6 More about restoring multiple Active Directory Objects
 19. Additional Domain Controllers19.1 Installing Additional Domain Controllers by Network
 19.2 Domain Controller LDAP Names
 19.3 Effects on Active Directory with additional domain controllers
 19.3.1 Computer account of DC2
 19.3.2 Site location of DC2
 19.3.3 Service Resource Records updated
 20. DHCP High Availability20.1 Multiple DHCP Servers on the Same Network
 20.1.1 To Install and Authorize DHCP Server on DC2
 20.1.2 Using the Split Scope Wizard
 20.2 DHCP Failover
 20.3 About DHCP Load Sharing mode
 21. Global Catalog and FSMO Roles21.1 Introduction to Global Catalog and FSMO Roles
 21.2 Global Catalog (通用類別目錄)
 21.3 Compacting Active Directory Database
 21.4 Schema Master – Per Forest
 21.4.1 To display current Schema Master Role
 21.4.2 To safely transfer the Schema Master Role to DC2
 21.4.3 To Seize (強奪) transfer the Schema Master Role on DC1
 21.4.4 To extend Active Directory Schema
 21.4.5 To disable an Active Directory Schema
 21.5 Domain Naming Master – Per forest
 21.5.1 To display current Domain Naming Master of your forest
 21.5.2 To safely transfer Domain Naming Master role to DC2 (無須進行,理解便可)
 21.5.3 To seize Domain Naming Master role at DC1 (無須進行,理解便可)
 21.6 PDC Emulator– Per Domain
 21.6.1 Configuring Windows Time Service on PDC Emulator
 21.7 Relative ID Master – Per Domain
 21.7.1 To display current RID Master of your forest
 21.8 Infrastructure Master – Per Domain
 21.9 Active Directory Replication Status Tool
 22. Microsoft Entra ID22.1 Entra ID Administrator Roles
 22.1.1 Global Administrator role
 22.1.2 User Administrator role
 22.1.3 Billing Administrator role
 22.2 Users and Licenses of Microsoft Entra ID
 22.3 Terminology of Microsoft Entra ID
 22.4 Microsoft Entra ID Custom Domain names
 22.5 Creating Entra ID User account
 22.6 Managing User Profile Information
 22.7 Resetting Microsoft Entra ID User Password
 22.8 Configure Access with Microsoft Entra ID Groups
 22.9 Dynamic Group
 22.10 Differences between Azure RBAC roles and Entra ID administrator roles
 22.11 Set up directory synchronization
 22.11.1 Principal of Password Hash Synchronization
 22.12 Monitoring AD Connect Synchronization Health
 22.12.1 Entra ID Connect Sync Insight
 22.12.2 Sync Latency
 22.12.3 Sync Object Changes
 22.12.4 To Disable Entra Connect Sync
 23. Windows Admin Center23.1 Overview of Windows Admin Center
 23.2 Deploying Windows Admin Center
 23.3 Configuring Windows Admin Center
 23.4 Enabling Windows Admin Center Single-Sign On (SSO)
 23.5 Deploying Extensions to Windows Admin Center
 24. NIC Teaming24.1 Introduction to NIC Teaming
 24.2 Configuring NIC Teaming
 24.3 Configuring LACP
 25. Windows Containers25.1 Introduction to Windows Containers
 25.2 Fundamental Concepts of Windows Containers
 25.2.1 The Microsoft container ecosystem
 25.2.2 Container Host
 25.2.3 Container Image
 25.2.4 Sandbox
 25.2.5 Container OS Image:
 25.2.6 Container Repository
 25.3 Windows Container Types
 25.3.1 Windows Server Containers
 25.3.2 Hyper-V Container
 25.4 Introduction to Docker
 25.5 Containers for Developers
 25.6 Containers for IT Professionals
 25.7 Configuring Windows Container Host
 25.8 Deploying a container
 25.8.1 More about Windows container version compatibility
 25.9 Building Container Images
 25.9.1 Manually creating container image
 25.10 Hyper-V Containers
 25.11 A Special Reminder on Hyper-V Container Host
 25.12 More about Hyper-V isolation
 25.13 Container Networking Concepts
 26. Azure Container Instances (ACI)26.1 Introduction to ACI
 26.2 Creating Azure Container Instance
 26.3 Viewing Container Logs
 26.4 Quota and Limits of Azure Container Instances
 
 27. Azure Container Registry (ACR)
 27.1 Introduction to Azure Container Registry, Repository and Images
 27.1.1 About Container Registry
 27.1.2 About Repository
 27.1.3 About Container Image
 27.2 Use cases and Key features of Azure Container Registry
 27.3 Creating a Private Container Registry
 27.4 Pull, Build, Push, Run a container image using Azure Container Registry Tasks
 27.5 Azure Container Registry Roles and Permissions
 28. High Availability Features28.1 Failover Clusters
 28.1.1 Quorum Configuration in Windows Server
 28.1.2 Two-node file server cluster
 28.1.3 Configure Possible Owners
 28.1.4 Failback
 28.2 Scale-Out File Server for Application Data
 28.2.1 Introduction to Scale-Out File Server
 28.2.2 Deploying a Scale-Out File Server
 28.3 Configuring Hyper-V to use Scale-Out File Server (Optional Knowledge)
 28.4 The SMB Witness protocol (Optional knowledge)
 28.5 Managing a Failover Cluster with Windows Admin Center
 29. Configuring ADDS Forest29.1 Additional Domains in existing Forest
 29.2 Configuring a new domain tree to join existing forest
 29.2.1 Creating new Domain Tree to join existing Forest on DCA
 29.2.2 Check the Trust relationship
 29.3 Conditional DNS Forwarding
 29.3.1 Enable Conditional forwarding of xyz.com in systematic.com’s DNS Server
 29.3.2 Enable Conditional forwarding of systematic.com in xyz.com’s DNS Server
 29.4 Enabling Global Catalog (GC) for xyz.com
 29.4.1 Enabling GC on dca.xyz.com
 29.4.2 Adding DNS Service Location (SRV) Record for Global Catalog Server
 29.5 An Example of Domain-Wide authentication and Resource assessment
 29.6 Assigning Permissions in a multi-domain environment
 29.7 Active Directory Migration Tool
 29.7.1 Installing ADMT and SQL Server Express
 29.7.2 Migrating Domain User Account
 29.7.3 More about ADMS and IMS
 29.8 Deploying Child Domain
 29.8.1 Creating DNS Delegation for domain “money.xyz.com”
 29.8.2 Deploying domain controller for a child domain
 30. Managing ADDS Trusts30.1 Types of Trust within a Forest (Intra-Forest)
 30.2 Types of Inter-Forest Trust (Inter-Forest)
 30.3 Creating Forest Trust
 30.3.1 Background
 30.3.2 Creating a Two-Way Transitive Forest Trust
 30.4 Updating UPN Suffixes for Forest Trust
 30.5 Selective Authentication
 30.5.1 事前驗證
 30.5.2 Deploying Selective Authentication
 30.5.3 Granting “Allowed-to-Authenticate” permission to  larry@msn.com  on KV1
 31. On-Premise and Internet DNS31.1 The Domain Name Space
 31.2 Types of Windows DNS Zones
 31.3 Active Directory Integrated Zone
 31.3.1 Zone data storage of Active Directory Integrated Zone
 31.3.2 Zone Replication Scope
 31.3.3 Using Application Directory Partition
 31.4 Standard Primary Zone
 31.5 Standard Secondary Zone
 31.6 Three Methods to Implement a DNS Zone
 31.6.1 To Install One More DNS Server on WS2 and managed by DC1
 31.6.2 To Create systematic.com Standard Secondary Zone for WS2 DNS Server
 31.6.3 Configure DC1 to allow zone transfer to WS2 DNS Server
 31.7 Forward Lookup Zone and Host (A) Records
 31.8 Reverse Lookup Zone and Pointer (PTR) Records
 31.8.1 To Create a Reverse Lookup Zone
 31.8.2 To Create a Pointer (PTR) Record
 31.9 Forward Lookup Zone and Mail Exchanger (MX) Records
 31.10 Name Server (NS) Record and the Name Servers Tab
 31.11 More about Zone Transfer from Primary to Standard Secondary
 31.12 DNS Sub-domains
 31.12.1 Creating a DNS Sub-domain By Using “New Domain”
 31.12.2 Creating a DNS Sub-domain By Using “New Delegation”
 31.12.3 Creating a DNS Sub-domain By Using “Stub Zone”
 31.13 Background zone loading
 31.14 Global Names Zone
 31.14.1 To create a Global Names Zone (GNZ)
 31.14.2 Deploying GlobalNames zone for Multiple forest
 31.15 Three Tiers (三重) of Caching (緩衝)
 31.15.1 1st Tier – Client Side Caching
 31.15.2 2nd Tier – Queries through an Cache (中途的) DNS server
 31.15.3 3nd Tier – Memory Caching on Authoritative Primary or Secondary Servers
 31.16 Forwarders
 31.16.1 Server-level Forwarder
 31.16.2 Conditional Forwarder
 31.16.3 Configuring Conditional Forwarders
 31.16.4 Storing Conditional Forwarder in Active Directory
 31.17 Root Zone, Root Hints
 31.17.1 Creating Root Zone
 31.17.2 Deleting Root Zone
 
 AZ-801 Configuring Windows Server Hybrid Advanced Services (24 hrs)
 1. Advanced DNS Server configuration1.1 More about Zone Transfer: AXFR and IXFR
 1.2 BIND Secondaries
 1.3 DNS Debug Logging
 1.4 Removing out-dated DNS records
 1.5 Securing DNS resource records
 1.6 Dynamic Update
 1.7 Restricting DNS Server interface binding
 2. DNS Client side configuration2.1 Configuring DNS client by NRPT policy
 3. DNS Security Extensions3.1 Overview of DNSSEC
 3.2 Threats of DNS Protocol
 3.3 Principal of DNS Security Extension
 3.3.1 Digital Signatures
 3.3.2 Zone Signing
 3.3.3 Authenticated Denial of Existence
 3.3.4 Trust Anchors
 3.3.5 DNSSEC key management
 3.3.6 DNSSEC-aware DNS Clients
 3.3.7 NRPT Policy for DNSSEC Validation
 3.4 A DNSSEC Test Lab scenario
 3.4.1 Create the zone “fabrikam.com”
 3.4.2 Configure the cache DNS server WS2
 3.4.3 Reconfigure DNS Client to use Cache DNS Server
 3.5 Configuring and testing DNSSEC
 3.5.1 Query unsigned zones without DNSSEC validation requirement
 3.5.2 Signing a zone by DNSSEC
 3.5.3 To distribute Trust Anchor Manually
 3.5.4 Querying a Signed-Zone without Validation requirement
 3.5.5 Configuring DNS Client to perform DNSSEC validation
 3.5.6 Querying a Signed-zone with Validation required
 3.5.7 Situation when Validation Failed
 3.5.8 Situation when the attacker uses a Fake signature
 3.6 More about using DNSSEC for Public Internet Domains
 4. Windows Server Compute and Virtualization services4.1 Microsoft Hyper-V Server and Windows Server Hyper-V role
 4.2 Hyper-V General Requirements
 4.2.1 CPU and BIOS/UEFI Firmware
 4.2.2 More about Logical Processor and Virtual Processor
 4.2.3 Memory
 4.2.4 Network/NIC Requirements
 4.2.5 Storage
 4.2.6 Standalone Hyper-V with local disks
 4.2.7 Hyperconverged and Storage Spaces Direct
 4.2.8 Disaggregated Storage Spaces Direct
 4.2.9 Mixed architecture support
 4.3 Installing Hyper-V Role Service on Windows Server 2025
 4.4 Creating a Virtual Machine and Installing a Guest OS
 4.5 Installing and Configuring Windows Hyper-V Server (無需進行,理解便可)
 4.6 Configuring Hyper-V Server to accept Remote Management
 4.7 Managing Hyper-V Server from a remote location
 5. Configure Hyper-V Settings and Virtual Networks5.1 Configuring VHD Storage location
 5.2 Upgrading Virtual Machine Configuration Version
 5.3 Checkpoint (Snapshot) Location
 5.3.1 Standard Checkpoint
 5.3.2 Production Checkpoint
 5.4 Hot add and Hot removal of Virtual hardware
 5.5 Nested Virtualization
 5.6 Host Resource Protection
 5.7 Windows PowerShell Direct
 5.8 Managing Multiple Virtual Machines
 5.8.1 Creating VM collections (無須進行,理解便可)
 5.8.2 Creating Management Collections
 5.9 Configuring the Virtual Network
 5.9.1 Virtual Switch Manager
 5.9.2 Virtual Network Connection Type
 5.9.3 External virtual networks
 5.10 Guest Network Load Balancing
 5.10.1 Installing Network Interface Driver on Microsoft Hyper-V Server (無需進行,理解便可)
 5.10.2 Connecting a the Hyper-V Host to a VLAN
 5.10.3 Connecting a the Hyper-V Child Partition to a VLAN
 5.11 Single Root I/O Virtualization
 6. Shared Nothing Live Migration6.1 Concepts of Live Migration
 6.2 Configuring Live Migration in a Shared Nothing/Non-Clustered environment
 6.3 Performing Live Migration of virtual machine in a Shared Nothing environment
 6.4 More about Processor Compatibility Mode
 7. Hyper-V Replica Server7.1 Introduction to Hyper-V Replica
 7.2 Configuring Hyper-V Replica
 7.3 Testing Failover
 7.4 Performing a Planned Failover
 7.5 Performing a Un-planned Failover
 8. Generation 2 Virtual Machines8.1 Generation 2 Virtual Machine in Hyper-V
 8.1.1 To create a Generation 2 virtual machine:
 8.2 Enhanced Session Mode
 8.2.1 Overview of Enhanced Session Mode
 8.2.2 Practical application of Enhanced Session Mode
 8.2.3 To enable Enhanced Session Mode
 8.3 Virtual Disk Online Resizing
 8.4 Resource Metering (計量)
 8.4.1 Overview of Hyper-V Resource Metering
 8.4.2 Enabling and Using Resource Metering
 8.4.3 Using Virtual Network Adapter ACL
 8.5 Hyper-V Port Mirroring
 8.6 Using ReFS with Hyper-V
 9. Hyper-V Failover Clustering9.1 Deploying a Hyper-V Failover Cluster
 9.2 Cluster Shared Volume
 9.3 Cluster Shared Volumes (CSV) Cache
 9.4 Deploying a Highly Available Virtual Machine in Hyper-V Cluster
 9.5 Testing a Planned Failover by Live Migration
 9.6 Virtual Machine Drain on Shutdown
 9.7 Live Migration Settings and RDMA
 9.7.1 Live Migration Settings
 9.7.2 RDMA (Remote Direct Memory Access)
 9.8 Virtual Machine Network Health Protection
 9.9 Virtual Machine Monitoring
 9.10 Hyper-V Replica Broker
 9.11 Hyper-V Virtual Machine Load Balancing
 9.12 Configuring RDMA Adapter and Converged Ethernet
 9.12.1 Data Center Bridging for RDMA
 9.12.2 Creating a Hyper-V Virtual Switch with an RDMA Capable adapter
 9.13 Hyper-V Switch Embedded Teaming (SET)
 9.13.1 Introduction to Hyper-V Server Switch Embedded Teaming
 9.13.2 Creating a SET Team in Hyper-V
 9.13.3 SET Modes and Balancing Algorithms
 10. Creating and Managing Azure Virtual Machines10.1 Benefits and Challenges using N-Tier Architecture
 10.2 N-Tier architecture with Azure Compute Virtual Machines
 10.2.1 To Implement N-Tier Virtual Machine based Architecture
 10.3 Enabling Auto-shutdown for VM
 10.4 Configuring and Managing additional data disk for Azure Virtual Machines
 10.5 Configure Azure Disk Encryption
 10.5.1 Azure Disk Encryption Workflow
 10.5.2 Azure Disk Decryption Workflow
 10.5.3 Azure Disk Encryption Prerequisites
 10.5.4 Supported VM Sizes
 10.5.5 Virtual Networking
 10.5.6 Key Vault Access Policy
 10.5.7 Enable encryption on existing or running IaaS Windows VMs
 10.6 Resizing Virtual Machines
 10.6.1 To Resize a virtual machine which is available in the current cluster
 10.6.2 Resizing a Virtual Machine to support Ultra Disk
 10.7 Hot Patching
 10.7.1 How hotpatching works
 10.7.2 Deploy a new Azure VM with hotpatch for Windows Server enabled
 10.8 SMB over QUIC
 10.8.1 SMB protocol
 10.8.2 QUIC protocol
 10.8.3 Deploy SMB over QUIC
 10.9 SMB over QUIC with Automanage
 11. Cross Premises and Hybrid Connectivity11.1 Introduction to VNet Peering
 11.2 Configuring Global VNet Peering
 11.2.1 Benefits of VNet Peering
 11.2.2 Gateways and on-premises connectivity
 11.2.3 Lab of Configuring Global VNet Peering
 11.3 Options for connecting additional virtual networks
 11.4 Point-to-Site VPN and Certification based authentication
 11.4.1 About VPN P2S Authentication process
 11.4.2 Generating a Client Authentication certificate
 11.4.3 Exporting the Root Certificate in BASE64 public key .cer format
 11.4.4 Configuring VPN Client Address Pool and Tunnel Type
 11.4.5 Uploading trusted Root Certificate
 11.4.6 Generate VPN Client packages
 11.5 Configuring Azure Site to Site (S2S) VPN
 11.5.1 Configuring Site-to-Site Connections in Azure VPN Gateway
 11.5.2 Configuring On-Premises VPN device
 11.5.3 Verifying Connectivity
 11.6 Azure Virtual Network Adapter
 11.6.1 Register a WAC Gateway with Azure Cloud
 11.6.2 Add an Azure Network Adapter to a server
 11.7 Microsoft Defender for Cloud
 11.7.1 Set up Microsoft Defender for Cloud
 11.7.2 Onboarding your machines to threat and vulnerability management
 11.7.3 Connect your non-Azure machines to Microsoft Defender for Cloud (無須進行,理解便可)
 11.7.4 Connect your non-Azure machines to Microsoft Defender for Cloud with Defender for Endpoint
 12. Microsoft Defender for Identity12.1 Introduction to MDI/Azure ATP
 12.1.1 Monitor and analyze user behavior and activities
 12.1.2 Protect user identities and reduce the attack surface
 12.1.3 Identify suspicious activities and advanced attacks across the cyber-attack kill-chain
 12.2 Microsoft Defender for Identity architecture
 12.2.1 Defender for Identity components
 12.2.2 Defender for Identity portal
 12.2.3 Defender for Identity sensor
 12.2.4 Requirements
 12.3 Creating a Defender for Identity Instance
 12.4 Connect to your On-Premises AD Forest
 12.5 Downloading and Installing the Sensor setup package
 12.6 Configure Data Steering in MDI Sensor
 12.7 About Microsoft Advanced Threat Analytics (ATA)
 12.8 Security Posture Assessments with Microsoft Defender for Identity
 13. Data Deduplication13.1 Introduction to Data Deduplication in Windows Server
 13.2 Installing and Configuring Data Deduplication
 13.3 Data Deduplication enhancements in Window Server
 13.3.1 Support for large volumes
 13.3.2 Shortened Deduplication process
 13.3.3 Support for large files
 13.4 Additional Interoperability considerations of using Data Deduplication
 13.4.1 DFS Replication
 13.4.2 FSRM Quotas
 14. On-Premises Performance Monitoring14.1 Reliability Analysis Component (RAC)
 14.2 Data Collector Set
 14.3 Performance Counter Alert
 14.4 Event Trace Sessions
 15. Azure Recovery Services Vault15.1 Introduction to Recovery Services Vault
 15.2 Creating a Recovery Services Vault
 15.3 Back up Windows to Azure
 15.4 Configuring the Vault for backing up On-Premises Windows
 15.4.1 Installing Agent and Registering On-Premises Server
 15.4.2 Create the backup policy
 15.4.3 Restoring files from Azure Recovery Services Vault
 15.5 Back up an Azure Virtual Machine
 15.5.1 Preparation to backup Azure Virtual Machine
 15.5.2 Back up the Azure VM using Azure Backup service
 15.6 Upgrading Azure VM Backup stack V2 (Optional knowledge)
 15.7 More about Site-to-Site recovery by using Azure Site Recovery
 15.7.1 Introduction to Azure Site Recovery services
 15.7.2 Migrating On-premises Hyper-V Virtual Machine to Azure
 16. Azure Migrate Appliance16.1 Introduction to Azure Migrate
 16.2 Creating a Migration Project
 16.3 Deploying Azure Migrate appliance with VHD template for Hyper-V
 16.3.1 Generate the project key
 16.3.2 Download the VHD template
 16.3.3 Creating the appliance
 16.3.4 Configuring the Azure Migrate virtual appliance
 16.3.5 Set up prerequisites and register the appliance
 16.3.6 Starting Continuous Discovery of Hyper-V infrastructure
 16.4 Assess Hyper-V VMs for migration to Azure
 16.5 Migrate Hyper-V VMs to Azure
 16.6 Running a Test Migration
 16.7 Migrating to Azure Virtual Machines
 16.8 Completing the migration
 16.9 Post-migration best practices
 17. Protecting and Securing Windows Credentials17.1 Attacks to Windows Credential Store
 17.2 Requirements of Credential Guard
 17.3 Configuring Credential Guard
 17.4 Preventing NTLM authentication protocol
 18. Just Enough Administration (JEA)18.1 Overview of Just Enough Administration
 18.1.1 JEA Objectives
 18.1.2 JEA reduces risk by limiting administrator exposure
 18.1.3 JEA Working Principal
 18.1.4 Benefits of JEA
 18.1.5 JEA Deployment Prerequisites
 18.2 Creating a JEA Role Capability File
 18.3 Convert Role Capability File as PowerShell Module
 18.4 Creating a JEA Session Configuration File
 18.5 Creating a JEA Endpoint
 18.6 Connecting to JEA Endpoint
 19. Azure ARC19.1 Introduction to Hybrid Infrastructure Management with Azure ARC
 19.2 Azure ARC Enabled Servers
 19.3 Onboarding Azure ARC Enabled Servers
 19.3.1 Generate installation script
 19.3.2 Install the agent using the script
 19.4 Onboarding ARC Enabled Servers at Scale
 19.5 Onboarding ARC Enabled Servers to Microsoft Sentinel
 19.6 Detect threats using Microsoft Sentinel
 19.7 More about Automated Response to Threats
 20. Internet Protocol Security (IPSec)20.1 Introduction to IPSec
 20.2 Deploying IPSec
 20.2.1 事前驗證
 20.3 IPsec Configuration in Windows Server
 20.3.1 Connection Security Rules
 20.3.2 Authentication Requirement
 20.3.3 Creating Connection Security Rule
 
   |