Becoming an Azure Pro: Complete AZ-104 Study Manual
The AZ-104 certification serves as a pivotal milestone for professionals seeking validation in managing Microsoft Azure environments. Designed with a pragmatic approach, this exam focuses on administrative skills necessary for provisioning, managing, and monitoring Azure-based services.
The Microsoft Certified: Azure Administrator Associate certification, achieved by passing the AZ-104 exam, validates an individual’s capacity to operate within the Azure ecosystem. It is not merely a theoretical assessment but a real-world benchmark for essential tasks such as identity management, governance, storage configuration, compute deployment, and virtual network operations. Employers often consider it a baseline qualification for cloud infrastructure roles.
This certification is curated for system administrators, cloud specialists, and IT professionals transitioning from on-premises solutions to cloud-native architectures. Candidates should ideally have a minimum of six months of direct experience with Azure services, including familiarity with PowerShell, Command Line Interface (CLI), the Azure portal, and deployment via ARM templates.
The exam assesses candidates on a wide spectrum of Azure administrative domains. These include:
Each domain carries a weighted percentage, ensuring a holistic evaluation of an individual’s capabilities.
Azure Administrators serve as the custodians of cloud-based resources, responsible for ensuring secure, efficient, and cost-effective deployments. They manage user identities, implement compliance policies, oversee scalable compute solutions, and maintain network connectivity. A certified administrator possesses the acumen to diagnose system issues, automate routine tasks, and reinforce security measures across virtual infrastructure.
The AZ-104 exam is composed of various question types such as multiple-choice, drag-and-drop, case studies, and active screen configurations. It tests both theoretical understanding and applied knowledge. Understanding the format and practicing with realistic simulations can drastically improve performance and confidence.
The identity and governance section, which accounts for 15-20% of the exam, emphasizes the manipulation and oversight of Azure Active Directory (Azure AD). Tasks within this domain include creating and managing users and groups, configuring role-based access control (RBAC), implementing security policies, and auditing user activity.
Effective identity governance involves streamlining authentication, ensuring access is granted on a need-to-know basis, and managing guest user access through business-to-business (B2B) collaboration models. Administrators should also be adept at using tools like Azure AD Join and self-service password reset configurations.
Azure’s resource management capabilities rely on hierarchies and policies. Candidates must be proficient in creating and organizing resource groups, assigning policies, and enforcing tagging strategies for efficient resource identification. Azure Policies allow administrators to define rules for compliance, whereas management groups help organize subscriptions hierarchically.
Understanding cost management and billing configurations is also paramount. This includes analyzing consumption patterns, setting up budgets, and using locks to prevent inadvertent deletion or modification of critical assets.
The storage component, which contributes to 10-15% of the exam, examines a candidate’s prowess in configuring storage accounts, implementing secure access strategies, and ensuring data resilience. Tasks include setting up firewalls for storage access, managing shared access signatures (SAS), and configuring Azure AD-based access to blobs and queues.
Azure provides redundancy through locally redundant storage (LRS), zone-redundant storage (ZRS), geo-redundant storage (GRS), and read-access geo-redundant storage (RA-GRS). Candidates must understand these replication options to architect for durability and availability.
Professionals should be conversant with data import/export procedures and tools like Azure Storage Explorer and AzCopy. These utilities facilitate large-scale data migrations and day-to-day storage operations. Furthermore, mastery of blob lifecycle management and tiering strategies—such as hot, cool, and archive storage tiers—is essential for cost optimization.
Comprising 25-30% of the exam, this domain delves into provisioning virtual machines (VMs), setting up high availability, and automating deployments. Candidates must demonstrate the ability to use scale sets, manage availability zones, and implement custom script extensions for configuration management.
Knowledge of disk types (Standard HDD, Standard SSD, Premium SSD), encryption practices, and backup configurations contributes to robust virtual machine management. Automation via ARM templates and scripting ensures repeatability and reduces deployment errors.
Beyond VMs, candidates are expected to understand how to deploy and manage containerized workloads using Azure Kubernetes Service (AKS) and Azure Container Instances (ACI). They should also be skilled in creating and scaling web applications through Azure App Services and managing App Service Plans.
Understanding how to configure health checks, custom domains, and deployment slots for zero-downtime deployments is crucial. These capabilities offer scalability and flexibility for modern application architectures.
Virtual networking, accounting for 30-35% of the exam, is a critical area. Candidates should understand how to create and configure virtual networks (VNets), implement subnets, assign static and dynamic IPs, and route traffic effectively.
Tasks also involve setting up network security groups (NSGs), configuring application gateways, implementing load balancers, and integrating on-premises networks through VPN gateways and ExpressRoute. Understanding private endpoints and service endpoints is essential for securing communications.
Azure Network Watcher and Network Performance Monitor are indispensable tools for diagnosing latency, packet loss, and connectivity issues. Candidates should also know how to use diagnostic logs, NSG flow logs, and metrics to identify and resolve anomalies.
Incorporating these monitoring practices ensures optimal performance and helps preempt potential system disruptions. Coupled with a solid understanding of hybrid connectivity options, these skills elevate the operational capabilities of Azure administrators.
An effective preparation plan involves a combination of practical labs, simulated assessments, and conceptual studies. Immersing oneself in the Azure portal, scripting daily tasks, and creating infrastructure from scratch can significantly reinforce understanding.
Candidates should frequently assess their progress with practice tests that mirror the real exam. Keeping abreast of updates within Azure, as the platform evolves rapidly, also contributes to exam readiness and long-term success.
Mastering the AZ-104 Microsoft Azure Administrator Certification requires a comprehensive grasp of cloud administration principles. It is not a rote memorization exercise but an opportunity to internalize practical skills that reflect real-world responsibilities. Whether for career advancement or organizational growth, this certification serves as a formidable asset in the cloud computing landscape.
Ensuring your virtual machines are resilient and adaptable is essential. High availability in Azure involves distributing VMs across availability sets or zones to reduce downtime during maintenance or unexpected failures. Scalability, on the other hand, is about adjusting resources to meet workload demands dynamically.
Azure supports VM Scale Sets which allow you to deploy and manage identical VMs. These can scale out automatically based on metrics like CPU usage. Understanding fault domains and updating domains within availability sets helps in planning for resiliency.
Azure VM Scale Sets are instrumental in deploying large numbers of identical virtual machines. They allow for centralized management and load balancing. Configuration typically includes defining instance count, OS type, image, VM size, and auto-scaling policies.
Load balancing is often paired with scale sets to distribute traffic effectively. Application Gateway or Azure Load Balancer are common tools for achieving this. Make sure to configure health probes to ensure traffic is routed only to healthy instances.
Automation is crucial in reducing manual errors and increasing deployment speed. ARM templates offer declarative syntax to define and deploy infrastructure. These templates are JSON files that specify resources and configurations.
To deploy an ARM template, use Azure CLI or PowerShell. Templates can also be stored in repositories for version control and reuse. For configuration, custom script extensions can execute scripts post-deployment, enabling tasks like software installation or configuration tweaks.
ARM templates are powerful for infrastructure as code. Modifying them involves updating parameters, variables, and resource definitions. Ensure you validate the template using tools like az deployment validate before deploying.
You can define conditional logic, use linked templates for modularity, and apply tags for resource categorization. Integrating with Azure DevOps pipelines adds another layer of automation, allowing for continuous integration and deployment.
Virtual Hard Disk (VHD) templates are used to create custom VM images. Start by configuring a VM with required settings and software. Generalize the VM using sysprep (for Windows) or waagent (for Linux), then capture the image.
Store the VHD in a storage account, and reference it in your ARM template or Azure CLI command during VM creation. Custom images save time when deploying multiple VMs with identical configurations.
Templates enable rapid, consistent deployments. Use the Azure Portal, CLI, or PowerShell to deploy a saved template. Define a parameter file to streamline repetitive deployments.
It’s essential to follow best practices, such as parameterizing values, using variables for repeat elements, and documenting your templates. Templates should be modular to enhance reuse across projects.
Once a resource is deployed via the Azure Portal, you can export the configuration as an ARM template. This template includes parameters and resource definitions that can be edited and redeployed.
Download it from the “Automation” section of the resource group blade. It serves as a starting point for customizing deployments and ensures consistency across environments.
Custom script extensions execute PowerShell or shell scripts post-deployment. They’re useful for tasks like installing software, changing configurations, or setting registry keys.
Define the script location (local or URL), and pass parameters during deployment. Scripts can be rerun manually or triggered through automation tools. For better management, consider storing scripts in secure, version-controlled locations.
Creating VMs involves choosing the OS image, size, region, and network settings. During configuration, assign a virtual network, subnet, public IP, and optionally, an availability set or zone.
Additional configurations include enabling boot diagnostics, setting OS and data disks, and defining extensions for post-deployment tasks. Automation using ARM templates or Azure CLI ensures rapid and standardized deployment.
Azure Disk Encryption uses BitLocker for Windows and DM-Crypt for Linux to protect data at rest. Encryption is enabled via the Azure Portal, CLI, or PowerShell.
You must use Azure Key Vault to manage encryption keys. Key management involves setting up access policies and ensuring that keys are backed up and rotated periodically.
Azure supports moving VMs between resource groups and subscriptions with minimal downtime. Use the Azure Portal, CLI, or PowerShell for the move operation.
Ensure that associated resources like network interfaces, disks, and public IPs are moved together. Permissions must be set correctly in both the source and target subscriptions.
VM sizing is critical to performance and cost optimization. Azure offers a wide range of VM series tailored for general use, compute-optimized, memory-optimized, and more.
Resize operations can be done through the portal or CLI. Ensure the VM is deallocated before resizing, and validate that the target size is available in your chosen region.
Attaching data disks expands storage capabilities. You can add managed or unmanaged disks to a VM. Configure disk settings like size, caching, and storage type during the attachment.
Once added, initialize and format the disk within the guest OS. For automation, use PowerShell or CLI scripts during VM creation.
Networking configuration includes assigning network interfaces, IP addresses, and DNS settings. Security groups are applied to control traffic.
Use PowerShell or the Azure Portal to open required ports, attach NICs, and configure static or dynamic IP addressing. For complex configurations, define networking in your ARM templates.
Redeploying a VM moves it to a new Azure node, which can resolve issues like remote desktop problems or failed patching. Use the “Redeploy” option in the Azure Portal.
This operation retains the VM’s configuration and public IP, but it’s always wise to back up important data beforehand. Post-redeployment, verify connectivity and performance.
Containers are lightweight, portable solutions for running applications. Azure offers Azure Kubernetes Service (AKS) and Azure Container Instances (ACI) for orchestration and single-container deployments respectively.
Define container settings like image source, environment variables, and ports. Use YAML files for AKS deployments, or CLI commands for ACI.
AKS simplifies Kubernetes cluster deployment and management. Configuration includes node pools, networking, and scaling settings. You can enable features like monitoring and RBAC during setup.
Ensure your cluster uses the latest Kubernetes version and integrates with Azure Container Registry or Docker Hub. Post-deployment, use kubectl to manage workloads.
ACI enables quick deployment of containers without managing infrastructure. Specify the image, CPU, memory, and environment variables.
You can expose containers to the internet, mount Azure Files as volumes, and use secure credentials via environment variables. ACI is ideal for development, testing, or stateless workloads.
Web Apps on Azure App Service provide a PaaS environment for hosting web applications. Configuration includes framework selection, deployment method, and scaling settings.
App Service integrates with DevOps tools for CI/CD. You can configure custom domains, SSL bindings, and authentication. Enable autoscaling based on performance metrics to optimize resource use.
App Service Plans define the compute resources for web apps. Options include shared, basic, standard, premium, and isolated tiers. Each tier offers different scaling and feature capabilities.
Scaling can be manual or automatic, and plan size can be adjusted post-deployment. Ensure you choose a plan that aligns with your app’s performance and availability requirements.
A virtual network (VNet) in Azure functions like a traditional network in your data center, with the benefits of scalability, availability, and isolation. Subnets help segment the VNet into manageable sections. While setting up a VNet, define the IP address range using CIDR notation and logically separate workloads using subnets.
Subnets can be associated with network security groups (NSGs) to control traffic flow. For better organization, consider naming conventions and IP planning upfront. Remember, subnet IP ranges cannot overlap, and changes require careful planning, especially in production environments.
Azure supports both public and private IP addressing. Public IPs allow internet access, whereas private IPs enable secure communication within VNets. During resource creation, you choose the IP type and assignment method (static or dynamic).
Use static public IPs for predictable endpoints, especially for services like DNS or firewall rules. Private IPs are allocated from the subnet’s address range and should be planned to avoid conflicts. For higher resilience, integrate IP addresses with Azure Load Balancer or Application Gateway.
NSGs act as virtual firewalls for controlling inbound and outbound traffic at the subnet or NIC level. They contain rules defined by priority, protocol, direction, source/destination, and port.
To harden security, use deny-all rules with allow rules for necessary ports. NSG flow logs can be enabled for troubleshooting or auditing traffic. Be cautious when applying rules broadly, as overly permissive configurations can lead to exposure.
Azure Firewall is a managed, cloud-native firewall that provides network and application-level protection. Deploy it to a dedicated subnet within your VNet.
Configure application rules for domain-based filtering and network rules for IP-based traffic. Use threat intelligence filtering to block known malicious IPs. Integrate it with Azure Monitor for logging and analytics. Azure Firewall supports high availability and auto-scaling, making it suitable for enterprise scenarios.
Azure DNS hosts your domain name system records in Azure, allowing you to manage DNS without managing your own DNS servers. Use it to resolve hostnames in your domains.
Create DNS zones for each domain and add record sets for A, AAAA, MX, and CNAME records. Azure DNS supports alias records to point to Azure resources directly. You can also enable private DNS zones for internal name resolution within VNets.
Routing in Azure is managed via system routes and user-defined routes (UDRs). Use UDRs to override the default behavior and direct traffic to virtual appliances or firewalls.
Azure Virtual Network NAT simplifies outbound connectivity for VNets. It allows multiple subnets to share a single public IP address while hiding internal IPs. Configure NAT gateway with appropriate public IP or IP prefix and associate it with subnets to streamline egress traffic.
VNet peering connects two VNets, allowing them to communicate privately without gateways. Peered VNets appear as one for connectivity purposes.
Peering supports transitive routing and can be done across regions (Global VNet Peering). Ensure address spaces don’t overlap. Traffic between peered VNets stays on Microsoft’s backbone network, ensuring low latency and high reliability.
ExpressRoute establishes private, dedicated connectivity between your on-premises network and Azure. It bypasses the public internet, offering more reliability and lower latency. Work with a connectivity provider to set up ExpressRoute circuits.
Site-to-Site VPN connects your on-premises network to Azure via IPsec tunnels. Configure VPN Gateway in Azure and a compatible VPN device on-prem. Ensure IP ranges do not overlap and that routing tables are properly configured.
Azure Bastion provides secure RDP and SSH connectivity to your VMs directly from the Azure Portal without exposing public IPs. Deploy it in a dedicated subnet called “AzureBastionSubnet.”
Bastion scales automatically and supports session logging. It reduces the attack surface significantly and integrates seamlessly with the portal UI, eliminating the need for external clients.
Network Watcher offers tools for monitoring, diagnosing, and gaining insights into your network. Enable it per region to utilize features like connection troubleshoot, IP flow verify, NSG flow logs, and packet capture.
Use topology views to visualize your network setup and diagnose connectivity issues. Integrate with Log Analytics for long-term storage and advanced queries. Regular use of Network Watcher helps maintain a healthy and secure network infrastructure.
When diagnosing connectivity problems, start with basic ping and trace route tests. Use Network Watcher’s connection troubleshoot tool to verify path and identify issues.
Check NSG rules, UDRs, and route tables for misconfigurations. DNS resolution problems may stem from incorrect or missing records. For VM-specific issues, inspect NIC settings and verify IP address assignments.
Azure Application Gateway is a layer 7 load balancer offering SSL termination, path-based routing, and web application firewall (WAF) capabilities. Deploy it to manage traffic to your web apps securely.
Configure backend pools, listeners, and routing rules. Enable WAF to protect against OWASP top threats. Application Gateway integrates with Azure Key Vault for SSL certificates and supports autoscaling for dynamic workloads.
Azure Load Balancer operates at layer 4 and distributes inbound traffic among healthy VM instances. Use it for both internal and public-facing applications.
Define frontend IP configuration, backend pools, and health probes. Load balancing rules control traffic flow. Use zone-redundant frontends for high availability across regions. It supports both TCP and UDP protocols.
Traffic Manager is a DNS-based traffic distribution service that routes clients to the most appropriate endpoint based on routing method. It supports performance, priority, weighted, geographic, and multi-value routing.
Define profiles and associate endpoints like Azure Web Apps, VMs, or external sites. Health checks ensure traffic is directed only to healthy endpoints. It enables high availability and global responsiveness for your services.
Though often confused with Azure Load Balancer, the term “Network Load Balancer” typically refers to internal configurations distributing traffic among backend services. Azure Load Balancer itself can be configured as an internal load balancer for traffic within a VNet.
Apply it when external access is unnecessary. Use backend health probes and NSG configurations to ensure proper traffic flow. It’s optimal for microservices or service tiers needing private, distributed access.
Access to VNets must be tightly controlled to maintain security. Use NSGs, Azure Firewall, and user-defined routes to limit exposure. Implement identity-based access via Azure RBAC.
Combine Bastion with just-in-time VM access to minimize open ports. Use Private Endpoints to access services securely without traversing the public internet. Enforce policy using Azure Policy for consistent governance across VNets.
A virtual network is the foundational component of Azure networking. It’s essential to define your IP address space using CIDR notation and divide it into subnets based on workload isolation or security requirements. Subnetting ensures granular control over resource traffic and allows for targeted network security configurations.
When configuring subnets, assign them non-overlapping address spaces and associate network security groups to control inbound and outbound traffic. Enabling service endpoints on subnets extends Azure services directly into your VNet, enhancing performance and security.
Public IP addresses allow Azure resources to communicate with the internet, while private IPs enable internal communication within the virtual network. Choose static IPs for predictable addressing or dynamic for flexible allocations.
When assigning public IPs, select the appropriate SKU and allocation method. Private IPs are typically assigned to VMs, load balancers, and other internal resources. Use DNS settings to enhance name resolution for both internal and external endpoints.
NSGs provide control over traffic flow at the subnet and network interface level. Define inbound and outbound security rules using parameters like source/destination IP, protocol, port range, and priority.
Create application-specific NSGs and assign them to subnets or individual NICs. Monitor NSG flow logs to gain visibility into allowed and denied traffic patterns. Fine-tuning rules enhances both security and performance.
Azure Firewall is a managed, cloud-native security service that protects Azure Virtual Network resources. It offers high availability and unrestricted cloud scalability. Configuration includes setting up application and network rules, threat intelligence filtering, and logging.
Deploy Azure Firewall into its own subnet within a virtual network. Define rules to allow or deny traffic based on IP addresses, FQDNs, and protocols. Integrate with Azure Monitor for logging and alerting.
Azure DNS allows you to host DNS zones and manage records for your domains within Azure. This service ensures low-latency, high-availability name resolution for internal and external domains.
Create DNS zones and add records such as A, AAAA, CNAME, MX, and TXT to support your applications. For internal DNS, use Azure-provided DNS or custom DNS servers defined in the VNet settings.
Virtual network peering connects two VNets to enable private traffic routing between them. Peering reduces latency compared to using a VPN and simplifies resource access across regions or subscriptions.
Configure peering settings to allow forwarded traffic, gateway transit, and access to remote virtual network resources. Peered VNets must have non-overlapping address spaces.
VPN Gateways provide secure connectivity between Azure and on-premises environments or other cloud providers. You can choose between route-based and policy-based VPNs depending on your requirements.
Deployment involves creating a gateway subnet, selecting a SKU, and setting up a public IP. Configure the local network gateway to represent your on-premises address space and define the shared key for authentication.
ExpressRoute establishes a private, dedicated connection between your on-premises infrastructure and Azure. It’s ideal for scenarios demanding high bandwidth, low latency, or compliance with regulatory requirements.
You must work with a connectivity provider to set up ExpressRoute circuits. Configure peering types (private, Microsoft, and public), define routing domains, and integrate with your existing WAN architecture.
Application Gateway is a web traffic load balancer that provides SSL termination, cookie-based session affinity, and application firewall capabilities. It’s particularly effective for Layer 7 routing scenarios.
Define backend pools, HTTP settings, listeners, and routing rules. You can use URL-based routing to direct traffic to specific backend pools based on the request path. Enable Web Application Firewall (WAF) for enhanced security.
Azure Load Balancer distributes incoming traffic across multiple virtual machines to ensure high availability. It supports inbound and outbound scenarios for both internet-facing and internal applications.
Set up frontend IP configurations, backend pools, health probes, and load balancing rules. Choose between Basic and Standard SKUs based on scalability and feature requirements.
Monitoring tools such as Network Watcher provide deep visibility into network performance and traffic patterns. Use tools like connection troubleshoot, topology viewer, and IP flow verify for diagnostics.
Enable NSG flow logs, packet capture, and diagnostic logging for comprehensive auditing. Regularly review metrics and alerts in Azure Monitor to detect anomalies or performance bottlenecks.
Hybrid networking extends your on-premises infrastructure to the cloud. Use VPN Gateway or ExpressRoute to establish secure connections.
Ensure your address spaces do not overlap and update route tables to enable seamless communication. Configure BGP if dynamic routing is required. Implement redundancy and failover strategies for high availability.
Azure Bastion provides secure and seamless RDP and SSH access to VMs without exposing them via public IPs. It’s deployed in a virtual network and supports browser-based access.
Set up a Bastion host in a dedicated subnet called “AzureBastionSubnet”. Assign role-based access controls to manage user access and ensure that NSGs allow required traffic to the Bastion host.
Private Endpoints allow you to access Azure services over a private IP within your virtual network. This enhances security by eliminating the need to traverse the internet.
Associate a private endpoint with a resource instance, and configure DNS to resolve to the private IP. This setup is commonly used with services like Azure Storage, SQL Database, and Key Vault.
Route tables determine how traffic is directed within a virtual network. Use user-defined routes (UDRs) to override Azure’s default system routes.
Assign route tables to subnets and define custom routes with next-hop types like virtual appliance, internet, or none. Route tables are vital in complex network topologies or when using network virtual appliances.
Popular posts
Recent Posts