Demystifying the Azure Administrator Associate Certification: Skills, Exam, and Benefits
Cloud computing has become essential for modern IT infrastructure. Organizations across industries rely on cloud platforms to drive innovation, improve operational efficiency, and scale services globally. Among the top cloud service providers, Microsoft Azure stands out for its extensive offerings, integration with existing Microsoft products, and global reach.
Azure allows businesses to host applications, store data, manage virtual networks, and deploy artificial intelligence solutions—all under a single platform. However, leveraging these capabilities effectively requires trained professionals who can manage, monitor, and secure Azure environments. This is where the AZ-104 certification comes in.
The AZ-104 certification, formally known as Microsoft Certified: Azure Administrator Associate, is designed for IT professionals responsible for implementing, monitoring, and maintaining Microsoft Azure solutions. It validates the ability to manage Azure identities, governance, compute, storage, networking, and monitoring.
This certification is ideal for those with hands-on experience in Azure administration. While not strictly entry-level, it serves as a strong starting point for professionals transitioning to cloud roles. The AZ-104 is a stepping stone to more advanced certifications such as Azure Solutions Architect or DevOps Engineer.
Several roles align with the AZ-104, including:
These professionals benefit from understanding core Azure services and how to apply administrative best practices.
Earning the AZ-104 certification demonstrates a professional’s commitment to mastering Azure administration. It:
Certified Azure administrators are in high demand, with competitive salaries and opportunities for career advancement.
The AZ-104 exam tests candidates on five key domains:
Each domain comprises multiple tasks and skills. The exam is scenario-based and includes multiple-choice, drag-and-drop, and simulation questions. It emphasizes practical knowledge and the ability to perform real-world administrative tasks.
To prepare effectively, candidates should:
Practical experience is the most crucial component. Building and managing resources in Azure is the best way to reinforce learning.
As of the current pricing, the AZ-104 exam costs USD 165. This fee covers one exam attempt. Costs for training materials, practice exams, and courses are separate and vary. Discounts or vouchers may be available through promotions or Microsoft partnerships.
To register, visit Microsoft’s certification website, create an account, and schedule your exam at a testing center or through online proctoring.
Managing identities in Azure is crucial for securing access to cloud resources. Azure Active Directory (Azure AD) is the backbone of identity and access management in Azure. It enables administrators to control who can access what resources and under what conditions.
Azure AD provides a centralized platform to manage user credentials, group memberships, access permissions, and security policies. It supports features like single sign-on (SSO), multi-factor authentication (MFA), and integration with external identity providers.
Administrators can create and manage users and groups through various interfaces:
Groups are used to manage access collectively. Types include:
Dynamic groups automatically add members based on user attributes. This helps automate access control.
Administrative Units (AUs) allow organizations to delegate administrative control over subsets of users and groups. For example, a regional admin can manage only users in their geographical area without affecting other parts of the organization.
AUs enhance delegation and organizational efficiency, especially in large enterprises.
RBAC allows administrators to assign specific permissions to users, groups, or applications. It operates using:
RBAC ensures that users only have access to what they need, following the principle of least privilege. Roles can be assigned using:
If built-in roles do not meet organizational requirements, custom roles can be created. For example, a custom role can allow starting VMs but not deleting them. Custom roles are defined using JSON templates and can be assigned to any scope.
Organizations with on-premises Active Directory often use Azure AD Connect to synchronize identities with Azure AD. Synchronization options include:
Key tasks:
Azure AD Connect enables seamless sign-on and unified identity management.
Azure Policy enforces rules and standards across resources. It ensures that deployments comply with organizational guidelines. Policies can:
Policies can be assigned at different scopes and evaluated in:
Use Azure CLI to assign policies:
az policy assignment create –policy “policyDefinitionID” –scope “/subscriptions/{subscription-id}/resourceGroups/{resource-group}”
Blueprints combine multiple governance elements:
They help organizations deploy compliant environments consistently. Though Microsoft is transitioning to newer tools, Blueprints are still part of the AZ-104 exam.
Resource Locks prevent accidental modification or deletion. Types:
Example:
New-AzResourceLock -LockName “ProtectVM” -LockLevel CanNotDelete -ResourceName “VM01” -ResourceType “Microsoft.Compute/virtualMachines” -ResourceGroupName “ProdRG”
Tags are key-value pairs for organizing resources. They help with:
CLI example:
az resource tag –tags Environment=Production Owner=Admin –name MyVM –resource-group MyRG
Conditional Access enforces policies based on user and device conditions. Examples:
MFA strengthens security by requiring multiple verification methods. Supported methods include:
Configure policies using the Azure AD portal or the security center.
Management Groups allow hierarchical organization of subscriptions. Example:
Policies and RBAC roles can be assigned at the management group level for centralized control.
Azure Monitor collects logs and metrics across Azure. It integrates with:
Enable diagnostics and use KQL to query logs. Example:
SigninLogs | where ResultType != 0 | project UserPrincipalName, ResultDescription, Location, TimeGenerated
You can set alerts for failed logins, permission changes, or policy violations.
Azure Identity and Governance is a foundational domain within the AZ-104 Microsoft Azure Administrator certification. It focuses on ensuring secure, structured, and accountable access and control mechanisms in an Azure environment. This part will cover the key topics in this domain: Azure Active Directory, Role-Based Access Control, Governance tools like Azure Policy and Blueprints, and related operational practices.
Azure Active Directory (Azure AD) is a cloud-based identity and access management service provided by Microsoft. It helps organizations manage user identities and control access to resources across Microsoft services, third-party applications, and internal enterprise systems.
Azure AD is designed for cloud-first environments, whereas traditional Active Directory (AD DS) is domain-centric and optimized for on-premises infrastructures. Azure AD is
Proper identity management is critical in Azure environments. Administrators must create, update, and manage users and groups to ensure secure access control.
Users can be created through multiple methods:
These users can be cloud-only or synchronized from on-premises using Azure AD Connect.
Groups streamline access management. The two main types of groups in Azure AD are:
Groups can be:
Administrative Units allow scoped role assignments within Azure AD. They are especially useful in large organizations. For example, you can grant a help desk admin access only to manage users in a specific department without giving them global permissions.
Administrative Units are commonly used to:
RBAC is used to grant users the minimum necessary permissions. It is one of the most powerful governance features in Azure.
If a user needs to monitor resources but not make changes, you can assign them the Reader role at the resource group level.
You can assign roles using:
If built-in roles do not meet your needs, you can define custom roles. For example, a role that allows a user to restart virtual machines but not delete them.
Many organizations operate hybrid identity systems, combining on-premises Active Directory with Azure AD. Azure AD Connect is used to synchronize identities between the two systems.
Azure AD Connect is essential for scenarios where users need seamless access to both on-prem and cloud-based resources.
Conditional Access provides policy-based controls to enforce security based on conditions such as location, device state, and risk level.
Policies can be enforced via the Azure AD Portal. Each policy includes assignments (users, apps, conditions) and controls (grant/deny, enforce MFA, session limits).
MFA enhances security by requiring more than one method of verification:
Azure AD MFA can be enabled at:
It supports multiple verification options, including SMS, app notification, and hardware tokens.
Azure Policy enforces organizational standards and ensures resource compliance.
az policy assignment create \
–policy “policyDefinitionID” \
–scope “/subscriptions/{subscription-id}/resourceGroups/{resource-group}”
Policies are central to ensuring consistency and governance across all deployed resources.
Azure Blueprints help standardize and automate resource deployments along with governance settings. A blueprint can include:
BluePrints are useful in regulated industries where deployment consistency and compliance are essential.
Even though Azure is transitioning to using ARM templates and Bicep with policy initiatives for some of these functions, the AZ-104 still covers Blueprints.
Management Groups organize subscriptions into hierarchies to apply policies and RBAC centrally. The structure might look like this:
This allows IT teams to
Commands for managing this hierarchy are available in both PowerShell and CLI.
Tags and resource locks are operational governance tools.
Tags are key-value pairs used to classify resources.
Example:
az resource tag \
–tags Environment=Production Owner=Finance \
–name myVM \
–resource-group myRG
Tags help with:
Locks prevent unintended changes to critical resources. There are two types:
Example using PowerShell:
New-AzResourceLock -LockName “VMProtection” -LockLevel CanNotDelete -ResourceName “CriticalVM” -ResourceType “Microsoft.Compute/virtualMachines” -ResourceGroupName “ProdGroup”
Azure Monitor integrates with Azure AD and governance services to provide visibility and control.
Sign-in Logs
| where ResultType != 0
| project UserPrincipalName, ResultDescription, Location, AppDisplayName, TimeGenerated
You can also export logs to a Log Analytics Workspace or external SIEM systems.
For the AZ-104 exam and practical Azure administration, you should be able to:
Managing storage and compute resources is a critical domain within the AZ-104 Microsoft Azure Administrator exam. It tests your ability to provision, configure, secure, and maintain Azure Virtual Machines (VMs) and storage services. These resources form the backbone of nearly every cloud application, and understanding how to manage them efficiently is key to any Azure administrator role.
This section covers core services including Azure Storage accounts, Blob and File Storage, Managed Disks, Virtual Machines, Scale Sets, Availability options, and backup strategies.
Azure Storage provides scalable, secure, and durable storage solutions for a variety of use cases. Understanding the types of storage is foundational to selecting the right solution.
Each of these services can be used in different scenarios depending on the application architecture and workload.
All storage services in Azure start with a storage account. A storage account provides a namespace and manages billing and replication.
To ensure high availability and durability, Azure offers different redundancy models:
Choose the appropriate redundancy based on cost, performance, and disaster recovery requirements.
az storage account create \
–name mystorageaccount \
–resource-group myRG \
–location eastus \
–sku Standard_LRS \
–kind StorageV2
Blob storage is Azure’s object storage solution for the cloud. It is optimized for storing massive amounts of unstructured data.
Blob storage offers tiered pricing based on access frequency:
az storage blob upload \
–account-name mystorageaccount \
–container-name mycontainer \
–name myfile.txt \
–file ./myfile.txt
Azure Files provides shared file storage that can be accessed via standard protocols like SMB or NFS.
az storage share create \
–name myfileshare \
–account-name mystorageaccount \
–quota 100
net use Z: \\mystorageaccount.file.core.windows.net\ myfileshare /u:Azure\mystorageaccount <storage-key>
Azure Disk Storage provides high-performance block storage for Azure Virtual Machines.
az disk create \
–resource-group myRG \
–name myDisk \
–size-gb 128 \
–sku Premium_LRS
Azure VMs provide scalable, on-demand compute resources. They are ideal for applications that require full control over the operating system and environment.
az vm create \
–name myVM \
–resource-group myRG \
–image UbuntuLTS \
–admin-username azureuser \
–generate-ssh-keys
Selecting the right VM size and availability configuration is key to performance and reliability.
Scale Sets allow you to deploy and manage a set of identical VMs with load balancing and auto-scaling capabilities.
az vmss create \
–name myScaleSet \
–resource-group myRG \
–image UbuntuLTS \
–upgrade-policy-mode automatic \
–admin-username azureuser \
–generate-ssh-keys
Custom Script Extensions run scripts post-deployment to configure or install software.
az vm extension set \
–resource-group myRG \
–vm-name myVM \
–name CustomScriptExtension \
–publisher Microsoft.Azure.Extensions \
–settings ‘{ “fileUris”: [“https://<url>/script.sh”], “commandToExecute”: “sh script.sh” }’
Azure Backup provides scalable and cost-effective backup for Azure VMs without requiring on-premises infrastructure.
az backup protection enable-for-vm \
–vm myVM \
–vault-name myVault \
–resource-group myRG \
–policy-name DefaultPolicy
Security is a crucial aspect of managing Azure Storage. Azure offers multiple access methods:
SAS tokens provide time-bound and permission-limited access to storage.
az storage blob generate-sas \
–account-name mystorageaccount \
–container-name mycontainer \
–name myfile.txt \
–permissions r \
–expiry 2025-05-01T00:00Z \
–output tsv
Provides identity-based access control using Azure RBAC. More secure than account keys or SAS.
Monitoring performance and usage is essential for optimization and troubleshooting.
Perf
| where ObjectName == “Processor” and CounterName == “% Processor Time”
| summarize avg(CounterValue) by bin(TimeGenerated, 5m), Computer
Automation helps streamline operations and optimize costs.
Move blobs to lower-cost tiers or delete them after a certain time.
Networking and monitoring are core components of managing infrastructure in Microsoft Azure. Azure networking ensures secure, scalable, and high-performance connectivity, while monitoring services enable visibility and control over cloud operations. The AZ-104 exam expects candidates to understand how to configure virtual networks, secure resources using network security groups, connect on-premises and Azure environments, implement DNS, and monitor resources using built-in tools like Azure Monitor and Network Watcher.
This section provides a comprehensive breakdown of the essential Azure networking and monitoring features, tools, and best practices.
A Virtual Network (VNet) is the fundamental building block for private networking in Azure. VNets allow resources to communicate securely with each other, with on-premises infrastructure, and with the internet.
az network vnet create \
–name MyVNet \
–resource-group MyRG \
–address-prefix 10.0.0.0/16 \
–subnet-name MySubnet \
–subnet-prefix 10.0.1.0/24
Subnets are logical divisions within a VNet that allow you to separate workloads and apply different security and routing policies.
NSGs are firewall-like rules that control inbound and outbound traffic to Azure resources. NSGs can be associated with subnets or individual NICs.
az network nsg create \
–resource-group MyRG \
–name MyNSG
az network nsg rule create \
–resource-group MyRG \
–nsg-name MyNSG \
–name AllowSSH \
–protocol Tcp \
–direction Inbound \
–priority 1000 \
–source-address-prefix ‘*’ \
–source-port-range ‘*’ \
–destination-address-prefix ‘*’ \
–destination-port-range 22 \
–access Allow
Azure uses system-defined routes by default. You can override these using route tables and user-defined routes.
az network route-table create \
–name MyRouteTable \
–resource-group MyRG
az network route-table route create \
–resource-group MyRG \
–route-table-name MyRouteTable \
–name RouteToFirewall \
–address-prefix 0.0.0.0/0 \
–next-hop-type VirtualAppliance \
–next-hop-ip-address 10.0.2.4
Azure DNS allows you to host your domain names in Azure and use them for public and private name resolution.
You can override the default Azure-provided DNS with custom DNS servers for internal resolution or integration with on-prem environments.
az network vnet update \
–name MyVNet \
–resource-group MyRG \
–dns-servers 10.1.0.4 10.1.0.5
These allow for name resolution within VNets without exposing them to the public internet. Link VNets to private DNS zones to enable seamless internal resolution.
VNet Peering allows you to connect two VNets for private communication using Azure’s backbone network. Peered VNets can be in the same or different regions (global peering).
az network vnet peering create \
–name PeerAtoB \
–resource-group MyRG \
–vnet-name VNetA \
–remote-vnet VNetB_ID \
–allow-vnet-access
Azure provides multiple load balancing services depending on your application needs.
Distributes TCP/UDP traffic among virtual machines.
az network lb create \
–resource-group MyRG \
–name MyPublicLB \
–sku Standard \
–frontend-ip-name myFrontEnd \
–backend-pool-name myBackEndPool \
–public-ip-address MyPublicIP
Used for HTTP/HTTPS traffic, provides advanced routing and Web Application Firewall (WAF) capabilities.
az network application-gateway create \
–name MyAppGW \
–resource-group MyRG \
–capacity 2 \
–sku Standard_v2 \
–vnet-name MyVNet \
–subnet MySubnet
Use Front Door when you need global application acceleration and SSL termination. Use Traffic Manager for DNS failover and location-based routing.
Azure supports connecting on-premises environments using VPN or ExpressRoute.
Secure connection between your on-prem network and Azure VNet using IPsec.
az network vpn-connection create \
–name MyConnection \
–resource-group MyRG \
–vnet-gateway1 MyVNetGW \
–local-gateway2 MyOnPremGateway \
–shared-key MySharedKey
Used by individual clients (e.g., developers, remote staff). Supports certificate-based or Azure AD-based authentication.
A dedicated private connection between your datacenter and Azure through a service provider.
Network Watcher provides diagnostics and monitoring tools for Azure networks.
az network watcher configure \
–resource-group MyRG \
–locations eastus \
–enabled true
az network watcher show-topology \
–resource-group MyRG \
–location eastus
Azure Private Link enables private access to Azure services over your VNet, bypassing the internet entirely.
az network private-endpoint create \
–name MyPrivateEP \
–resource-group MyRG \
–vnet-name MyVNet \
–subnet MySubnet \
–private-connection-resource-id <resource-id> \
–group-ids blob \
–connection-name MyConnection
Extend your VNet’s identity to Azure services. Traffic still goes over the internet, but is secured and routed through Microsoft’s backbone.
az network vnet subnet update \
–name MySubnet \
–vnet-name MyVNet \
–resource-group MyRG \
–service-endpoints Microsoft.Storage
Azure Bastion allows RDP/SSH access to VMs directly from the Azure portal without requiring a public IP.
az network bastion create \
–name MyBastion \
–resource-group MyRG \
–vnet-name MyVNet \
–public-ip-address MyPublicIP \
–location eastus \
–subnet BastionSubnet
Azure Monitor collects, analyzes, and acts on telemetry data from your Azure and on-premises environments.
Log Analytics is a query tool for analyzing Azure Monitor logs using Kusto Query Language (KQL).
Perf
| where ObjectName == “Processor” and CounterName == “% Processor Time”
| summarize avg(CounterValue) by bin(TimeGenerated, 5m), Computer
AzureActivity
| where ResourceGroup == “MyRG” and ActivityStatus == “Failed”
Alerts help notify or automate actions based on system states.
Enable diagnostics to send data to Log Analytics, Event Hub, or Storage Account.
az monitor diagnostic-settings create \
–resource MyVM \
–resource-group MyRG \
–name MyDiagnosticSetting \
–workspace MyLogAnalyticsWorkspace \
–metrics ‘[{“category”: “AllMetrics”, “enabled”: true}] ‘ \
–logs ‘[{“category”: “AuditLogs”, “enabled”: true}]’
Final Thoughts
The AZ-104: Microsoft Azure Administrator certification is a pivotal credential for IT professionals looking to validate their skills in managing cloud-based infrastructure. It emphasizes hands-on expertise in core administrative tasks such as managing Azure identities, implementing governance strategies, provisioning compute resources, configuring storage solutions, and designing secure virtual networks. Beyond the exam, the knowledge gained is immediately applicable to real-world environments, making certified administrators more effective and valuable to their organizations. As cloud adoption continues to grow, Azure administrators play a critical role in ensuring performance, security, and scalability across business applications and services. Earning the AZ-104 not only demonstrates proficiency with Microsoft Azure but also opens the door to more advanced certifications and career opportunities in cloud architecture, security, and DevOps. For anyone serious about a future in cloud technology, this certification is a practical and respected step forward.
Popular posts
Recent Posts