{"id":1120,"date":"2025-07-07T07:55:34","date_gmt":"2025-07-07T07:55:34","guid":{"rendered":"https:\/\/www.test-king.com\/blog\/?p=1120"},"modified":"2026-01-02T10:51:55","modified_gmt":"2026-01-02T10:51:55","slug":"microsoft-azure-administrator-az-104-study-guide-and-cli-tips","status":"publish","type":"post","link":"https:\/\/www.test-king.com\/blog\/microsoft-azure-administrator-az-104-study-guide-and-cli-tips\/","title":{"rendered":"Microsoft Azure Administrator (AZ-104) Study Guide and CLI Tips"},"content":{"rendered":"\r\n<p>The Microsoft Azure Administrator Associate certification, known by its exam code AZ-104, is aimed at professionals who manage cloud services that span storage, networking, compute, identity, and governance in Microsoft Azure. It replaces the earlier AZ-103 exam and reflects current industry needs for Azure administrators. Candidates are expected to have at least six months of hands-on experience with Azure and a solid understanding of core services and their functions.<\/p>\r\n\r\n\r\n\r\n<p>The AZ-104 certification validates your ability to implement, manage, and monitor Azure environments. The exam is scenario-based, assessing both theoretical knowledge and practical experience. It requires a working knowledge of PowerShell, Azure CLI, the Azure portal, and ARM templates. This part focuses on preparing your mindset, understanding foundational concepts, and mastering Azure identity and governance.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Preparing for the AZ-104 Exam<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>To succeed in the AZ-104 exam, approach it as a test of real-world administrative skills rather than purely theoretical knowledge. Begin with understanding the structure of the exam and its domains. The five major domains include managing identities and governance, implementing and managing storage, deploying compute resources, configuring networking, and monitoring Azure resources.<\/p>\r\n\r\n\r\n\r\n<p>Each domain carries a different weight, so you should tailor your preparation accordingly. For example, managing identities and governance covers up to 25% of the exam. You should develop both conceptual clarity and practical proficiency across all domains, and especially for those that carry higher weight.<\/p>\r\n\r\n\r\n\r\n<p>Utilize a blend of documentation, lab exercises, and sample questions. As you study, build your own cheat sheet that outlines common commands, important service features, and decision-making frameworks. Avoid memorizing static facts. Instead, focus on understanding patterns and use cases.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure Identity and Governance Overview<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure identity management is primarily handled through Microsoft Entra ID, formerly known as Azure Active Directory. It is a cloud-based identity and access management service. Understanding Entra ID is essential because almost all Azure services tie into it for authentication and authorization.<\/p>\r\n\r\n\r\n\r\n<p>Identity in Azure is centered around user accounts, groups, service principals, and roles. Users and groups can be created manually or synchronized from on-premises directories. Service principals are identities used by applications or services, while managed identities provide automated identity management for Azure services.<\/p>\r\n\r\n\r\n\r\n<p>Governance tools help maintain compliance and organize resources efficiently. These include Azure Policy, resource locks, role-based access control (RBAC), tags, and management groups. Together, these tools allow administrators to enforce configuration standards, control access, prevent accidental deletion or modification, and categorize resources for billing or reporting.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Managing Users and Groups in Microsoft Entra ID<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Begin by learning how to create users manually through the Azure portal and programmatically using CLI or PowerShell. Understand how to modify user properties such as licenses, roles, and group memberships. External users, often part of business-to-business (B2B) collaboration, can be added and managed similarly.<\/p>\r\n\r\n\r\n\r\n<p>Groups are used to streamline permission management. You should know the difference between security groups and Microsoft 365 groups. Practice assigning licenses at the group level and configuring dynamic group rules that automatically include or exclude users based on attributes.<\/p>\r\n\r\n\r\n\r\n<p>Azure also allows self-service password reset, which must be configured through authentication methods and policies. Multifactor authentication (MFA) can be enforced either conditionally or as a tenant-wide policy. Conditional Access policies are used to define when and how MFA is triggered, based on user role, device state, location, or app sensitivity.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Role-Based Access Control (RBAC) in Azure<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>RBAC is essential to implement the principle of least privilege. Built-in roles like Reader, Contributor, and Owner offer varying levels of access. Custom roles can be defined with precise permissions using Azure Resource Manager.<\/p>\r\n\r\n\r\n\r\n<p>Permissions can be assigned at four scopes: management group, subscription, resource group, and individual resource. The inheritance model flows downward\u2014permissions assigned at a higher level apply to all nested resources unless explicitly overridden.<\/p>\r\n\r\n\r\n\r\n<p>You should learn how to evaluate existing role assignments and use Azure tools to troubleshoot access issues. This includes understanding how effective permissions are calculated, how deny assignments work, and how to audit access using activity logs.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Implementing Azure Governance Tools<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure Policy enables you to define rules for resource configurations. Policies can restrict resource types, enforce tag requirements, or require encryption on storage accounts. Multiple policies can be grouped into an initiative to apply a broader governance strategy.<\/p>\r\n\r\n\r\n\r\n<p>Locks are simple but powerful tools that protect critical resources from accidental changes. Read-only locks allow viewing but block modification. Delete locks prevent removal of resources. Apply them at resource, resource group, or subscription level.<\/p>\r\n\r\n\r\n\r\n<p>Tags are key-value pairs used to categorize resources. These are especially useful for billing, reporting, and automation. For example, you can tag resources with values such as environment type, department name, or cost center.<\/p>\r\n\r\n\r\n\r\n<p>Management groups allow you to organize subscriptions hierarchically. Policies and access control can be applied at this level, affecting all child subscriptions. This is particularly useful in large enterprises managing multiple teams or departments.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Cost Management and Alerts<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Administrators are responsible not just for deploying resources but also for managing their financial impact. Azure provides tools like cost analysis, budgets, and alerts. You can create budget alerts based on thresholds and get recommendations from Azure Advisor to optimize spending.<\/p>\r\n\r\n\r\n\r\n<p>Resource tagging also supports cost management. For instance, you can generate cost reports based on tags such as &#8220;Project&#8221; or &#8220;Team.&#8221; This helps stakeholders monitor their resource usage and stay within budget.<\/p>\r\n\r\n\r\n\r\n<p>Another essential area is monitoring unused or underutilized resources. Azure Advisor flags such cases, allowing you to shut down or resize services like VMs or databases.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Key Identity and Governance Tools<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Here is a list of tools and services you should become familiar with:<\/p>\r\n\r\n\r\n\r\n<p>portal \u2013 for manual tasks and visual management<br \/>azure cli \u2013 for scripting and automation<br \/>powershell \u2013 for complex scripting and advanced automation<br \/>graph api \u2013 for programmatic access to identity data<br \/>arm templates \u2013 for deploying RBAC and policy configurations<br \/>azure monitor \u2013 for auditing changes and tracking access<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Practice Exercises<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Create a new user in Entra ID using PowerShell<br \/>Assign a built-in role to a user at the resource group level<br \/>Write a policy definition that restricts VMs to a specific SKU<br \/>Apply a resource lock to prevent deletion of a storage account<br \/>Use cost analysis to identify the top five resources by cost<br \/>Configure MFA using a conditional access policy for all admins<\/p>\r\n\r\n\r\n\r\n<p>Identity and governance form the foundation of a secure and well-structured Azure environment. Mastering these topics early on enables you to configure services consistently and securely. Many of the tasks related to storage, compute, and networking build upon these identity and policy configurations. Take time to get comfortable with the concepts and tools described here before moving on to more advanced modules.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Understanding Azure Storage in AZ-104<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Storage is a core service in Azure, enabling users to persist and access data in multiple formats. The AZ-104 exam covers storage accounts, containers, file shares, replication, access control, and data transfer methods. A solid grasp of these concepts is essential for deploying and maintaining scalable cloud solutions.<\/p>\r\n\r\n\r\n\r\n<p>Azure offers various types of storage services tailored for different use cases. These include blob storage for unstructured data, file storage for shared access, queue storage for messaging between components, and table storage for NoSQL data. Mastering these services helps ensure that you can choose the appropriate solution for each scenario.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Types of Storage Accounts<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure provides several types of storage accounts:<\/p>\r\n\r\n\r\n\r\n<p>general-purpose v2: Supports all features including blobs, files, queues, and tables. This is the most commonly used account type for most scenarios.<br \/>general-purpose v1: Offers limited features and should only be used for backward compatibility.<br \/>blob storage account: Optimized specifically for storing blobs, such as images and videos.<br \/>premium storage: Offers low-latency and high-performance capabilities, primarily for IOPS-intensive workloads.<\/p>\r\n\r\n\r\n\r\n<p>You should also understand how to choose between performance tiers (standard vs. premium) and redundancy options (LRS, ZRS, GRS, RA-GRS).<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Configuring Storage Accounts<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Creating a storage account involves specifying its name, region, performance tier, redundancy setting, and access tier (hot or cool). Redundancy options define how data is replicated and protected:<\/p>\r\n\r\n\r\n\r\n<p>locally redundant storage (LRS): Three replicas within a single data center.<br \/>zone-redundant storage (ZRS): Replicas across different availability zones.<br \/>geo-redundant storage (GRS): Replication to a secondary region for disaster recovery.<br \/>read-access geo-redundant storage (RA-GRS): Same as GRS, but with read access to the secondary region.<\/p>\r\n\r\n\r\n\r\n<p>Each choice affects both cost and availability. Understanding these options helps you choose the right configuration for your workloads.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Access Control for Storage<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure offers multiple ways to control access to storage:<\/p>\r\n\r\n\r\n\r\n<p>shared access signature (SAS): Grants limited-time access to specific resources.<br \/>access keys: Provide full access and should be stored securely.<br \/>identity-based access: Integrates with Microsoft Entra ID to allow fine-grained control using RBAC.<br \/>stored access policies: Allow you to group shared access signatures and revoke them collectively.<\/p>\r\n\r\n\r\n\r\n<p>Identity-based access is considered more secure and scalable, especially in enterprise environments. Using role assignments, you can allow a user to access blob data without having to manage keys.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure Blob Storage<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Blob storage is used for storing large amounts of unstructured data like documents, videos, or backups. There are three types of blobs:<\/p>\r\n\r\n\r\n\r\n<p>block blobs: Used for storing text and binary data.<br \/>append blobs: Ideal for logs that require appending data.<br \/>page blobs: Used for virtual hard drives attached to Azure virtual machines.<\/p>\r\n\r\n\r\n\r\n<p>A blob storage container organizes blobs and defines their access level (private, blob-level public, or container-level public). Each container supports versioning, soft delete, and snapshots.<\/p>\r\n\r\n\r\n\r\n<p>Soft delete protects against accidental deletion by allowing you to recover deleted blobs within a retention period. Snapshots allow point-in-time captures of blob data, which are useful for backup and recovery scenarios.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure File Storage<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure Files provides shared file storage in the cloud that can be accessed via SMB or NFS protocols. It is commonly used for lift-and-shift scenarios, user profiles, and application configuration.<\/p>\r\n\r\n\r\n\r\n<p>Features of Azure File Storage include:<\/p>\r\n\r\n\r\n\r\n<p>standard and premium tiers<br \/>encryption at rest and in transit<br \/>NTFS support with Active Directory authentication<br \/>integration with Azure Backup and Azure File Sync<\/p>\r\n\r\n\r\n\r\n<p>File shares can be accessed from Azure VMs or on-premises systems, making them highly versatile. Azure File Sync allows you to cache cloud file shares on local Windows servers.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Storage Tools and Utilities<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Several tools are available for managing storage:<\/p>\r\n\r\n\r\n\r\n<p>azure portal: Provides a graphical interface for storage management.<br \/>azcopy: A command-line utility optimized for high-performance data transfers.<br \/>storage explorer: A GUI tool for managing blob containers, queues, and file shares.<br \/>azure cli and powershell: Used for scripting storage operations such as creating shares, generating SAS tokens, and setting access policies.<\/p>\r\n\r\n\r\n\r\n<p>You should practice using these tools in a sandbox environment. For example, use AzCopy to upload files to a blob container, or use Azure CLI to configure lifecycle rules.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Lifecycle Management and Data Tiering<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Blob lifecycle management is an automated way to move data between access tiers or delete it when it\u2019s no longer needed. Rules can be created based on blob age, last access time, or prefix.<\/p>\r\n\r\n\r\n\r\n<p>Azure supports the following blob tiers:<\/p>\r\n\r\n\r\n\r\n<p>hot: For frequently accessed data.<br \/>cool: For infrequently accessed data, stored for at least 30 days.<br \/>archive: For rarely accessed data, stored for at least 180 days.<\/p>\r\n\r\n\r\n\r\n<p>Lifecycle rules help optimize cost by moving data from hot to cool or archive as it ages. You can also delete blobs automatically after a defined retention period.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure Storage Redundancy and Object Replication<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Redundancy ensures data durability and high availability. Azure allows you to replicate data within the same region or across regions. Object replication allows you to replicate blobs from one storage account to another in a different region.<\/p>\r\n\r\n\r\n\r\n<p>Replication is configured at the storage account level and can be monitored through metrics and logs. Object replication requires setting up a replication policy that specifies source and destination containers.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Common Administrative Tasks<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>create a general-purpose v2 storage account with GRS redundancy<br \/>generate a SAS token with read-only permissions and expiry date<br \/>mount an Azure file share to a Windows server<br \/>configure blob lifecycle rules to delete data after 365 days<br \/>monitor storage account metrics such as availability, latency, and capacity<br \/>set up a backup policy for Azure file shares using Recovery Services Vault<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Key Concepts to Remember<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>understand how access tiers affect cost and performance<br \/>know when to use blob storage versus file storage<br \/>secure access using RBAC instead of shared keys<br \/>apply lifecycle rules to manage data automatically<br \/>choose the right redundancy option for business continuity<br \/>understand how AzCopy and Storage Explorer fit into your workflow<\/p>\r\n\r\n\r\n\r\n<p>Azure storage is foundational to most cloud applications. The AZ-104 exam requires a working knowledge of configuring, managing, and securing storage accounts. You should also be able to automate these tasks and ensure that your storage strategies are cost-efficient and scalable. Hands-on practice with storage tools is critical to mastering this topic.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Overview of Azure Compute Resources<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure compute services provide the foundation for hosting workloads in the cloud. These include virtual machines, containers, and serverless platforms. In the AZ-104 exam, you&#8217;re expected to be familiar with deploying and managing these resources using the Azure portal, ARM templates, Azure CLI, and PowerShell.<\/p>\r\n\r\n\r\n\r\n<p>The compute domain emphasizes infrastructure deployment, configuration, availability, and automation. You must understand how to work with both IaaS (like virtual machines and VM scale sets) and PaaS (like Azure App Services).<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Deploying Virtual Machines<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Virtual machines (VMs) are among the most commonly used Azure services. They allow you to host operating systems and applications just like in a traditional on-premises environment. Key considerations when deploying VMs include:<\/p>\r\n\r\n\r\n\r\n<p>choosing the right VM size and series<br \/>selecting an operating system image from the marketplace<br \/>configuring OS disk and data disks<br \/>setting availability options (zones or sets)<br \/>assigning network interfaces and public IPs<br \/>enabling backup and monitoring<\/p>\r\n\r\n\r\n\r\n<p>When creating a VM, you also define authentication methods (password or SSH key), storage configuration, and tagging for organization.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>VM Availability and Redundancy<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure offers features to ensure high availability for virtual machines:<\/p>\r\n\r\n\r\n\r\n<p>availability sets: Protect against hardware failures by distributing VMs across fault and update domains within a data center<br \/>availability zones: Distribute VMs across different physical locations within a region, offering higher fault tolerance<br \/>proximity placement groups: Place resources physically closer to reduce network latency<\/p>\r\n\r\n\r\n\r\n<p>These options are important for business continuity and disaster recovery planning.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Managing Virtual Machines<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Once deployed, virtual machines must be managed through various tools. You can:<\/p>\r\n\r\n\r\n\r\n<p>start, stop, restart, and deallocate VMs<br \/>resize a VM to scale up or down<br \/>attach or detach data disks<br \/>use Azure Bastion for secure RDP\/SSH access<br \/>enable Azure Monitor to collect performance and diagnostic data<br \/>configure Azure Disk Encryption for securing data at rest<\/p>\r\n\r\n\r\n\r\n<p>You should also know how to move VMs across resource groups, subscriptions, and regions using the portal or CLI. This supports reorganization or cost optimization.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Using ARM Templates and Bicep for Automation<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Infrastructure as Code (IaC) is essential in modern cloud administration. ARM templates (JSON format) and Bicep files (simplified syntax) allow you to define infrastructure in a declarative way.<\/p>\r\n\r\n\r\n\r\n<p>With these tools, you can:<\/p>\r\n\r\n\r\n\r\n<p>create reusable infrastructure templates<br \/>define resources with parameters and variables<br \/>use conditionals and loops<br \/>deploy templates from Azure CLI or PowerShell<br \/>export existing infrastructure as templates<br \/>convert between ARM and Bicep formats<\/p>\r\n\r\n\r\n\r\n<p>This automation approach ensures consistency and accelerates deployments across environments.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure Virtual Machine Scale Sets<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>VM scale sets allow you to deploy and manage a group of identical VMs with autoscaling capabilities. Use cases include application hosting, batch processing, and stateless front-end services.<\/p>\r\n\r\n\r\n\r\n<p>Features of scale sets:<\/p>\r\n\r\n\r\n\r\n<p>automatic scaling based on metrics (CPU, memory, schedule)<br \/>integration with load balancers and Application Gateway<br \/>support for both Windows and Linux<br \/>custom VM images or Azure marketplace images<br \/>automatic OS updates and repair<\/p>\r\n\r\n\r\n\r\n<p>Understanding how to configure and scale virtual machine scale sets is crucial for high-performance and resilient systems.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure Containers and Container Services<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Containers offer lightweight, portable environments for running applications. Azure provides several services to manage containers:<\/p>\r\n\r\n\r\n\r\n<p>azure container instances (ACI): Run containers without managing VMs<br \/>azure kubernetes service (AKS): Managed Kubernetes orchestration for complex containerized applications<br \/>azure container apps: Serverless container hosting with scaling and event-driven features<br \/>azure container registry (ACR): Private registry for storing container images<\/p>\r\n\r\n\r\n\r\n<p>You should understand how to:<\/p>\r\n\r\n\r\n\r\n<p>create and deploy containers using ACI and AKS<br \/>configure scaling and health monitoring<br \/>connect container workloads to virtual networks<br \/>authenticate with ACR using service principals or managed identities<\/p>\r\n\r\n\r\n\r\n<p>Containers are ideal for microservices architecture, continuous deployment, and applications requiring scalability.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Azure App Service<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>App Service provides a PaaS environment for hosting web apps, REST APIs, and mobile back ends. It abstracts infrastructure management and supports multiple languages and frameworks.<\/p>\r\n\r\n\r\n\r\n<p>Core features include:<\/p>\r\n\r\n\r\n\r\n<p>easy deployment using GitHub, DevOps, or ZIP uploads<br \/>built-in load balancing and autoscaling<br \/>custom domain and SSL certificate support<br \/>diagnostic logging and monitoring<br \/>backup and restore functionality<br \/>deployment slots for testing in production-like environments<\/p>\r\n\r\n\r\n\r\n<p>App Service plans determine pricing and performance (shared, basic, standard, premium). You can scale vertically (larger plans) or horizontally (more instances).<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Configuring App Service Networking and Security<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>App Services can be connected to private virtual networks using VNet Integration or private endpoints. This allows secure communication with back-end resources.<\/p>\r\n\r\n\r\n\r\n<p>Security best practices include:<\/p>\r\n\r\n\r\n\r\n<p>restricting access with IP restrictions or authentication<br \/>using Azure Front Door or Application Gateway for enhanced security<br \/>enabling HTTPS with TLS certificates<br \/>setting up custom domains with DNS configuration<br \/>configuring managed identities to access Azure services securely<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Monitoring and Scaling Compute Resources<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure Monitor integrates with compute services to track performance, generate alerts, and diagnose issues. Key metrics include CPU, memory, disk I\/O, and network usage.<\/p>\r\n\r\n\r\n\r\n<p>You can:<\/p>\r\n\r\n\r\n\r\n<p>create alert rules for anomalies<br \/>use log analytics to analyze trends<br \/>enable autoscaling rules based on metrics or schedules<br \/>set action groups to notify teams or trigger remediation workflows<\/p>\r\n\r\n\r\n\r\n<p>Scaling is supported across VMs, VM scale sets, and App Services. You must understand how to plan and configure scaling to meet performance demands while optimizing cost.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Backup and Disaster Recovery for Compute Resources<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure provides several tools for protecting compute resources:<\/p>\r\n\r\n\r\n\r\n<p>azure backup: Backs up VM OS disks and data disks to a Recovery Services vault<br \/>site recovery: Replicates VMs to a secondary region for disaster recovery<br \/>snapshot: Captures point-in-time state of a disk<br \/>custom scripts: Automate VM-level backup or replication with scheduled tasks<\/p>\r\n\r\n\r\n\r\n<p>For App Services, you can configure backup schedules and retention directly from the portal. Restoring can be done to the original or a different app.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Practice Scenarios<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>create a virtual machine with a custom image and size<br \/>configure disk encryption and backup policy for a VM<br \/>deploy a container image from Azure Container Registry to Azure Container Instances<br \/>create an App Service with custom DNS and SSL binding<br \/>scale a VM scale set based on CPU usage<br \/>deploy infrastructure using a Bicep file<br \/>configure diagnostic logging and alerts for an App Service<br \/>automate VM provisioning with a parameterized ARM template<\/p>\r\n\r\n\r\n\r\n<p>In this, you\u2019ve explored how to deploy, manage, and automate compute resources in Azure, including virtual machines, containers, and App Services. These services form the backbone of most Azure environments and require both conceptual understanding and practical experience.<\/p>\r\n\r\n\r\n\r\n<p>You&#8217;re encouraged to spend time in a test environment creating and managing these resources through the portal, CLI, and templates. The more hands-on experience you gain, the more prepared you\u2019ll be for the AZ-104 exam.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Understanding Azure Virtual Networking<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Virtual networks in Azure provide the backbone for communication between Azure resources and external environments. They are similar to traditional on-premises networks but are defined and managed through Azure.<\/p>\r\n\r\n\r\n\r\n<p>Key elements of virtual networking include:<\/p>\r\n\r\n\r\n\r\n<p>virtual networks (VNets): Logical isolation of the Azure cloud dedicated to a subscription<br \/>subnets: Subdivision of a VNet to organize and secure workloads<br \/>network interfaces (NICs): Attached to VMs and provide connectivity<br \/>IP addressing: Includes dynamic and static public and private IPs<\/p>\r\n\r\n\r\n\r\n<p>VNets support both IPv4 and IPv6 addresses and can span multiple availability zones within a region.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Configuring and Managing VNets<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>You can create and configure virtual networks using the Azure portal, PowerShell, CLI, or ARM templates. Key configuration tasks include:<\/p>\r\n\r\n\r\n\r\n<p>defining address space and subnet ranges<br \/>assigning NICs to VMs within subnets<br \/>enabling VNet peering for cross-VNet communication<br \/>configuring DNS settings at the VNet level<br \/>assigning service endpoints for secure Azure service access<\/p>\r\n\r\n\r\n\r\n<p>VNet peering allows low-latency, high-throughput connectivity between VNets in the same or different regions without requiring a VPN gateway.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Network Security Groups (NSGs) and Access Control<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Network security groups are essential for controlling inbound and outbound traffic at the subnet or NIC level. NSGs use rules that define source\/destination, protocol, port, and direction.<\/p>\r\n\r\n\r\n\r\n<p>Best practices for NSGs include:<\/p>\r\n\r\n\r\n\r\n<p>least privilege access<br \/>separate NSGs for front-end and back-end tiers<br \/>monitoring effective rules using Network Watcher<br \/>combining with Application Security Groups (ASGs) for role-based traffic management<\/p>\r\n\r\n\r\n\r\n<p>NSGs are stateless by default, meaning you must define rules for both inbound and outbound traffic as needed.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Securing Access to VNets<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure provides multiple methods for securing access to virtual networks:<\/p>\r\n\r\n\r\n\r\n<p>azure bastion: Allows secure RDP\/SSH connectivity to VMs without exposing public IPs<br \/>service endpoints: Extend VNet to Azure services like Storage or SQL, ensuring traffic stays within Azure backbone<br \/>private endpoints: Provide private IP addresses for Azure PaaS resources, isolating access to internal networks<br \/>VPN gateways: Enable encrypted connections between on-premises networks and Azure<br \/>expressroute: Offers dedicated private connections from your datacenter to Azure<\/p>\r\n\r\n\r\n\r\n<p>These solutions allow administrators to build secure, scalable hybrid networks.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>DNS and Name Resolution in Azure<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure supports name resolution using:<\/p>\r\n\r\n\r\n\r\n<p>azure-provided DNS: Default resolution for all VMs within a VNet<br \/>custom DNS: Allows integration with on-premises DNS servers<br \/>private DNS zones: Host DNS records that are not accessible over the public internet<\/p>\r\n\r\n\r\n\r\n<p>You can configure name resolution per VNet and link DNS zones to VNets as needed. This is particularly important when using services like App Service, AKS, and Private Link.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Load Balancing in Azure<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure offers several load balancing solutions:<\/p>\r\n\r\n\r\n\r\n<p>azure load balancer: Works at Layer 4 (TCP\/UDP) for distributing traffic across VMs<br \/>azure application gateway: Operates at Layer 7 (HTTP\/HTTPS) with support for path-based routing and SSL termination<br \/>azure front door: Global HTTP(S) load balancing with CDN integration<br \/>traffic manager: DNS-based load balancing for directing client traffic to optimal endpoints based on policies<\/p>\r\n\r\n\r\n\r\n<p>Each load balancer serves different needs depending on protocol, routing complexity, and geographic requirements.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Monitoring Azure Resources<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure Monitor provides unified observability across resources. Key components include:<\/p>\r\n\r\n\r\n\r\n<p>metrics: Near real-time numeric data, such as CPU and memory usage<br \/>logs: Structured event data collected by Azure Log Analytics<br \/>alerts: Triggers based on thresholds, activity logs, or queries<br \/>action groups: Define notifications and automation responses to alerts<br \/>workbooks: Custom dashboards for visualizing metrics and logs<br \/>insights: Specialized monitoring for specific services like VMs, Storage, and App Service<\/p>\r\n\r\n\r\n\r\n<p>Using Azure Monitor is critical for performance tuning and troubleshooting.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Using Azure Network Watcher<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Network Watcher helps diagnose and visualize network issues. Its features include:<\/p>\r\n\r\n\r\n\r\n<p>connection monitor: Continuously tests and verifies network connectivity<br \/>IP flow verify: Checks if traffic is allowed or denied by NSG rules<br \/>next hop: Shows where traffic will route from a VM<br \/>security group view: Displays effective NSG rules<br \/>packet capture: Captures network packets for deep inspection<\/p>\r\n\r\n\r\n\r\n<p>Network Watcher is especially useful when dealing with intermittent connectivity or suspected routing problems.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Backup and Recovery<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Azure offers two primary services for data protection:<\/p>\r\n\r\n\r\n\r\n<p>azure backup: Backs up VMs, Azure Files, and on-premises workloads<br \/>site recovery: Enables replication and failover of VMs to another Azure region<\/p>\r\n\r\n\r\n\r\n<p>Key backup tasks include:<\/p>\r\n\r\n\r\n\r\n<p>creating a Recovery Services Vault<br \/>configuring a backup policy<br \/>executing backups and verifying restore points<br \/>performing restores to original or alternate locations<\/p>\r\n\r\n\r\n\r\n<p>With Site Recovery, you can set up disaster recovery for VMs, define recovery plans, and simulate failovers for testing.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Disaster Recovery and Failover<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>To ensure business continuity, you should understand:<\/p>\r\n\r\n\r\n\r\n<p>replicating VMs across regions<br \/>configuring Site Recovery and selecting target resources<br \/>monitoring replication health and alerts<br \/>executing failovers and failback procedures<br \/>maintaining compliance with recovery time objectives (RTO) and recovery point objectives (RPO)<\/p>\r\n\r\n\r\n\r\n<p>Disaster recovery planning involves regular testing and documentation of recovery workflows.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Alerts and Automation<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Using Azure Monitor alerts, you can:<\/p>\r\n\r\n\r\n\r\n<p>detect performance degradation<br \/>notify administrators or DevOps teams<br \/>trigger logic apps, runbooks, or webhooks<br \/>create escalation paths with action groups<br \/>set severity levels and suppression rules<\/p>\r\n\r\n\r\n\r\n<p>Automation helps respond quickly to issues and enforces standards across large environments.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Practice Scenarios<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>create and peer two VNets in different regions<br \/>configure NSGs for tiered access (front-end, mid-tier, back-end)<br \/>create and test private endpoints for Azure Storage<br \/>deploy a load balancer and verify VM traffic distribution<br \/>set up alerts for high CPU usage on a VM<br \/>configure automated backup of a virtual machine<br \/>simulate failover using Azure Site Recovery<br \/>query logs for NSG rule matches using Azure Monitor<\/p>\r\n\r\n\r\n\r\n<p>This part provided a comprehensive overview of Azure\u2019s networking, security, monitoring, and recovery capabilities. These skills are vital for managing a robust Azure environment and ensuring uptime, security, and performance.<\/p>\r\n\r\n\r\n\r\n<p>You should now have a solid understanding of virtual networks, NSGs, private access, load balancing, diagnostics, and backup strategies. Practicing these skills in a test environment will deepen your expertise and prepare you for success in the AZ-104 exam.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Final Thoughts<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Reaching the end of your AZ-104 preparation journey is an achievement in itself. This certification is not just a validation of your knowledge\u2014it\u2019s a reflection of your dedication to mastering Microsoft Azure and becoming a capable cloud administrator. Whether you&#8217;re entering the field or leveling up your career, the AZ-104 credential holds strong value in today\u2019s cloud-first IT landscape.<\/p>\r\n\r\n\r\n\r\n<p>The AZ-104 exam covers a wide range of Azure services, from identity and governance to virtual networking, storage, compute resources, and monitoring. Preparing for this exam demands a solid balance of theoretical understanding and practical application. Reading about concepts is important, but the exam\u2014and real-world Azure work\u2014requires that you can implement and troubleshoot those concepts effectively.<\/p>\r\n\r\n\r\n\r\n<p>As you wrap up your study efforts, focus on these key takeaways:<\/p>\r\n\r\n\r\n\r\n<p>Don\u2019t spread yourself too thin. Prioritize the core objectives of the exam such as identity management, deploying virtual machines, configuring storage, and monitoring Azure resources. These areas often carry more weight in the exam and are critical for success in a real job role.<\/p>\r\n\r\n\r\n\r\n<p>Nothing replaces hands-on practice. Create and manage virtual machines, configure backup policies, set up network security groups, deploy ARM templates, and explore the monitoring tools. Real interaction with the portal will cement your understanding better than any reading material.<\/p>\r\n\r\n\r\n\r\n<p>Practice exams are more than a gauge of readiness\u2014they are tools for deep learning. Review each question and understand why each answer is correct or incorrect. This reflection process strengthens both your knowledge and your test-taking skills.<\/p>\r\n\r\n\r\n\r\n<p>As the exam day approaches, resist the urge to cram. Instead, do short, focused reviews of key concepts and use your cheat sheet to refresh commands and procedures. On exam day, read each question carefully and manage your time thoughtfully. Trust in the effort you\u2019ve put into preparation.<\/p>\r\n\r\n\r\n\r\n<p>Earning the AZ-104 certification is a milestone, but it\u2019s also a foundation. It prepares you to take on more advanced certifications and roles in cloud architecture, security, and DevOps. Use it as a launchpad to grow your skills and expand your influence as an Azure professional.<\/p>\r\n\r\n\r\n\r\n<p>Passing the AZ-104 exam is very achievable with focused, consistent effort. It requires clarity in your study plan, commitment to hands-on practice, and a clear understanding of Azure&#8217;s foundational services. Keep your learning steady, don\u2019t rush the process, and most importantly\u2014stay curious. The cloud evolves constantly, and every exam you pass is just another step in your continuous learning journey.<\/p>\r\n\r\n\r\n\r\n<p>Take pride in the progress you\u2019ve made and push forward with confidence. You\u2019re well on your way to becoming a certified Microsoft Azure Administrator\u2014and opening the door to greater opportunities in the cloud world.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Azure Administrator Associate certification, known by its exam code AZ-104, is aimed at professionals who manage cloud services that span storage, networking, compute, identity, and governance in Microsoft Azure. It replaces the earlier AZ-103 exam and reflects current industry needs for Azure administrators. Candidates are expected to have at least six months of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[106,116],"tags":[],"class_list":["post-1120","post","type-post","status-publish","format-standard","hentry","category-all-certifications","category-microsoft"],"_links":{"self":[{"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/posts\/1120"}],"collection":[{"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/comments?post=1120"}],"version-history":[{"count":2,"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/posts\/1120\/revisions"}],"predecessor-version":[{"id":5224,"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/posts\/1120\/revisions\/5224"}],"wp:attachment":[{"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/media?parent=1120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/categories?post=1120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.test-king.com\/blog\/wp-json\/wp\/v2\/tags?post=1120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}