Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(1)
100% found this document useful (1 vote)
178 views
20 pages
Azure Well-Architected Pillars
by Microsoft. The cloud has changed the way organizations solve their business challenges, and how applications and systems are designed.
Uploaded by
Nickleus Jimenez
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Azure Well-Architected Pillars For Later
Share
100%
100% found this document useful, undefined
0%
, undefined
Print
Embed
Report
100%
(1)
100% found this document useful (1 vote)
178 views
20 pages
Azure Well-Architected Pillars
by Microsoft. The cloud has changed the way organizations solve their business challenges, and how applications and systems are designed.
Uploaded by
Nickleus Jimenez
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Azure Well-Architected Pillars For Later
Share
100%
100% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Azure Well-Architected Pillars For Later
You are on page 1
/ 20
Search
Fullscreen
Azure Well-Architected pillars By Microsoft The cloud has changed the way organizations solve their business challenges, and how applications and systems are designed. The role of a solution architect is not only to deliver business value through the functional requirements of the application, but also to ensure the solution is designed in ways that are scalable, resilient, efficient, and secure. Solution architecture is concerned with the planning, design, implementation, and ongoing improvement of a technology system. The architecture of a system must balance and align the business requirements with the technical capabilities that are needed to execute those requirements. The end architecture is a balance of risk, cost, and capability throughout the system and its components Azure Well-Architected framework The Azure Well-Architected framework is a set of guiding tenants to build high- quality solutions on Azure. While there is no one-size-fits-all approach to designing an architecture, there are some universal concepts that will apply regardless of the architecture, technology, or cloud provider. While these are not all-inclusive, focusing on these concepts will help you build a reliable, secure, and flexible foundation for your application. The Azure Well-Architected framework consists of five pillars: * Cost optimization * Operational excellence * Performance efficiency * Reliability * SecurityEarn ——— Coens Cost optimization You will want to design your cloud environment so that it's cost-effective for operations and development. Inefficiency and waste in cloud spending should be identified to ensure you're spending money where you can make the greatest use of is Operational excellence By taking advantage of modern development practices, such as DevOps, you can enable faster development and deployment cycles. You need to have a good monitoring architecture in place so that you can detect failures and problems beforethey happen or, at a minimum, before your customers notice. Automation is a key aspect of this pillar to remove variance and error while increasing operational agility. Performance efficiency For an architecture to perform well and be scalable, it should properly match resource capacity to demand, Traditionally, cloud architectures accomplish this balance by scaling applications dynamically based on activity in the application. Demand for services change, so it's important for your architecture to have the ability to adjust to demand as well. By designing your architecture with performance and scalability in mind, you'll provide a great experience for your customers while being cost-effective Provisioned: opacity Demand Efficient Inefficient Reliability Every architect's worst fear is having your architecture fail with no way to recover it. A successful cloud environment is designed in a way that anticipates failure at all levels. Part of anticipating these failures is designing a system that can recover from the failure, within the time that's required by your stakeholders and customers.Security Data is the most valuable piece of your organization's technical footprint. In this pillar, you'll focus on securing access to your architecture through authentication and protecting your application and data from network vulnerabilities. The integrity of your data should be protected as well, by using tools like encryption. You must think about security throughout for the entire lifecycle of your application; from design and implementation to deployment and operations. The cloud provides protections against a variety of threats, such as network intrusion and DDoS attacks, but you still need to build security into your application, processes, and organizational culture. Exposed Malware Network Attacks att HH ing App Vulnerability General design principles In addition to each of these pillars, there are some consistent design principles that you should consider throughout your architecture. ¢ Enable architectural evolution: No architecture is static. Allow for the evolution of your architecture by taking advantage of new services, tools, and technologies when they're available.© Use data to make decisions: Collect data, analyze it, and use it to make decisions surrounding your architecture. From cost data, to performance, to user load, using data will guide you to make the right choices in your environment. * Educate and enable: Cloud technology evolves quickly. Educate your development, operations, and business teams to help them make the right decisions and build solutions to solve business problems. Document and share configuration, decisions, and best practices within your organization. * Automate: Automation of manual activities reduces operational costs, minimizes error introduced by manual steps, and provides consistency between environments. Shared responsibility Moving to the cloud introduces a model of shared responsibility. In this model, your cloud provider will manage certain aspects of your application, leaving you with the remaining responsibility. In an on-premises environment, you are responsible for everything. As you move to infrastructure as a service ([aaS), then to platform as a service (PaaS) and software as a service (SaaS), your cloud provider will take on more of this responsibility. This shared responsibility will play a role in your architectural decisions, as these decisions can have implications on cost, security, and the technical and operational capabilities of your application. By shifting these responsibilities to your provider, you can focus on bringing value to your business and move away from activities that aren't a core business function. Net = = | oa ne oe Aine ine | Middleware Midewere IEEE Es pees | eens = re Di ProxiterNanagesDesign choices In an ideal architecture, you would build the most secure, high performance, highly available, and efficient environment possible. However, as with everything, there are trade-offs. To build an environment with the highest level of all these pillars, there is a cost. That cost may be in actual money, time to deliver, or operational agility. Every organization will have different priorities that will impact the design choices that are made in each pillar. As you design your architecture, you will need to determine which trade-offs are acceptable, and which are not. When building an Azure architecture, there are many considerations to keep in mind. You want your architecture to be secure, scalable, available, and recoverable. To make that possible, you'll have to make decisions based on cost, organizational priorities, and risk. Operational Excellence Performance efficiency Reliability Security External Reference: https://docs.microsoft.com/en- us/azure/architecture/framework/cost/overview Cost optimization Your organization has moved a majority of their systems to the cloud, but you're now seeing cost increases in areas you didn’t expect. After some observation, you realize that you're inefficient across your environment, and you're still doing manual operational work. In this unit, you'll learn about cost optimization, and you'll look at some ways to reduce unnecessary expenses and improve operational efficiencies.What is cost optimization? Cost optimization is ensuring that the money your organization spends is being used to maximum effect. Cloud services provide computing as a utility. Technologies in the cloud are provided under a service model, to be consumed on demand. This on- demand service offering drives a fundamental change that directly impacts planning, bookkeeping, and organization. When an organization decides to own infrastructure, it buys equipment that goes onto the balance sheet as assets. Because a capital investment was made, accountants categorize this transaction as a capital expense (CapEx). Over time, to account for the assets’ limited useful lifespan, assets are depreciated or amortized. Cloud services, on the other hand, are categorized as an operating expense (OpEx), because of their consumption model. Under this scheme, there is no asset to amortize. Instead, OpEx has direct impact on net profit, taxable income, and the associated expenses on the balance sheet. When an organization adopts a cloud platform, it must shift away from CapEx- oriented budgeting towards OpEx, reflecting the shift from owning infrastructure to leasing solutions. Some organizations can derive value just from this new accounting model. For example, a startup company can attract investors by demonstrating a profitable idea at large scale, without needing a large investment up front to purchase infrastructure. To optimize costs in your organizations architecture, there are several principles that you can use to guide your efforts. Plan and estimate costs For any cloud project, whether it's the development of a new application or the migration of an entire datacenter, it's important to get an estimate of your costs. This involves identifying any current resources to move or redevelop, understanding business objectives that may impact sizing, and selecting the appropriate services for the project. With the requirements identified, you can use cost estimation tools to provide a more concise estimate of the resources that would be required, Transparency is important here, so that all stakeholders can review for accuracy and have visibility into the costs that are associated with the project. Provision with optimiza’Provisioning services that are optimized for cost from the outset can reduce your work effort in the future. For example, you should ensure that you're selecting the appropriate service level for your workload, and take advantage of services that let you adjust the service level. You should also use discounts when they're available, such as reserved instances and leveraging bring-your-own-license offers. Where possible, you want to move from laaS to PaaS services. PaaS services typically cost less than laaS, and they typically reduce your operational costs as well. With PaaS services, you don't have to worry about patching or maintaining VMs, because those activities are typically handled by the cloud provider. Not all applications can be moved to PaaS, but with the cost savings that PaaS services provide, it's certainly something worth considering. Use monitoring and analytics to gain cost insights If you're not monitoring your spending, you don't know what you can save. Take advantage of cost management tools and regularly review billing statements to better understand where money is being spent. Take time to conduct regular cost reviews across services to understani resource requirements of the workload, and adjust as necessary. Identify and track down any cost anomalies that may show up on billing statements or through alerts. Ifyou notice a large spike in cost associated with network traffic, it could uncover both cost savings and potential technical issues. the expenditure is appropriate for the Maximize efficiency of cloud spend Efficiency is focused on identifying and eliminating unnecessary expenses within your environment. The cloud is a pay-as-you-go service, and avoidable expenses are typically the result of provisioning more capacity than your demand requires. Operational costs can also contribute to unnecessary or inefficient costs. These inefficient operational costs show up as wasted time and increased error. As you design your architecture, identify and eliminate waste across your environment. Waste can show up in several ways. Let's look at a few examples © Avirtual machine that is always 90% idle * Paying for a license included in a virtual machine when a license is already owned * Retaining infrequently accessed data on a storage medium optimized for frequent access * Manually repeating the build of a non-production environmentIn each of these cases, more money is being spent than it should, and each case presents an opportunity for cost reduction. As you evaluate your cost, take the opportunity to optimize environments. Capacity demands can and will change over time, and many cloud services have the ability to manually or dynamically adjust the provisioned resources to meet the demands. These adjustments can drive the balance between a well-running application at the most cost-effective size. Optimize your systems at every level. At the network level, ensure that data transfer is efficient and meets the expectations of your customers. Use services to cache data to increase application performance and reduce the transaction load on your data storage services. Identify and decommission unused resources, and take advantage of lower-cost data storage tiers to archive infrequently accessed data Operational Excellence Moving just your resources to the cloud is only taking advantage of a small portion of what the cloud can bring to your organization. Along with the technical capabilities the cloud brings, you can improve your operational capabilities as well From improving developer agility to improving the visibility you have to the health and performance of your application, you can use the cloud to improve the operational capabilities of your organization. In this unit, we'll take a look at the operational excellence pillar. What is operational excellence? Operational excellence is about ensuring you have full visibility into how your application is running, and ensuring the best experience for your users. Operational excellence includes making your development and release practices more agile, which allows your business to quickly adjust to changes. By improving operational capabilities, you can have faster development and release cycles, and a better experience for users of your application. There are several principles that you can use when driving operational excellence through your architecture. Design, build, and orchestrate with modern practicesModern architectures should be designed with DevOps and continuous integration in mind. A modem architecture will give you the ability to automate deployments Using infrastructure as code, automate application testing, and build new environments as needed. DevOps is as much cultural as it is technical, but can bring many benefits to organizations that embrace it Regardless of whether your project is a greenfield application using full continuous integration and continuous deployment (CI/CD) and containers, or if it's a legacy application that you're continuing to service, there are DevOps practices you can bring into your organization. Breaking down silos within an organization, and working collaboratively across every stage in a project including change management, is a common thread throughout DevOps. Creating a culture of sharing, collaboration, and transparency will bring operational excellence to your organization. Use monitoring and analytics to gain operational insights Throughout your architecture, you want to have a thorough monitoring, logging, and instrumentation system. By creating an effective system for monitoring what's going on in your architecture, you can ensure that you'll know when something isn’t right before your users are impacted, With a comprehensive approach to monitoring, you'll be able to identify performance issues, cost inefficiencies, correlate events, and gain a greater ability to troubleshoot issues. Operationally, it's important to have a robust monitoring strategy. This helps you identify areas of waste, troubleshoot issues, and optimize the performance of your application, A multilayered approach is essential. Gathering data points from components at every layer will let you alert when values are outside of acceptable values and track spending over time. Use automation to reduce effort and error You should automate as much of your architecture as possible. The human element is costly, injecting time and error into operational activities. This increased time and error will result in increased operational costs. You can use automation to build, deploy, and administer resources. By automating common activities, you can eliminate the delay in waiting for a human to intervene. Test You should include testing in your application deployment and your ongoing operations. A good testing strategy will help you identify issues in your applicationbefore it's deployed, and ensure that dependent services can properly communicate with your application, A good testing strategy can also help identify performance issues and potential security vulnerabilities in both pre-production and production deployments. A robust testing plan can uncover issues with infrastructure deployments that can impact end-user experience, and testing will help you to provide a great experience for your users. Performance efficiency Imagine that a news story was just published about one of your organization's recent product announcements. The additional publicity from the news story will undoubtedly bring a large influx of traffic to your website. Will your website be able to handle this traffic increase, or will the additional load cause your site to be slow or unresponsive? In this unit, you'll look at some of the basic principles of ensuring outstanding application performance using scaling and optimization principles that make up the performance efficiency pillar. What is performance efficiency? Performance efficiency is matching the resources that are available to an application with the demand that it is receiving. Performance efficiency includes scaling resources, identifying and optimizing potential bottlenecks, and optimizing your application code for peak performance. Let's take a look at some patterns and practices that can be leveraged to enhance the scalability and performance of your application, Leverage scaling up and scaling out Compute resources can be scaled in two different directions: * Scaling up is adding more resources to a single instance.Scale Up * Scaling out is adding more instances. a G Seale Out Go Gg Scaling up is concerned with adding more resources, such as CPU or memory, to a single instance. This instance could be a virtual machine or a PaaS service. The act of adding more capacity to the instance increases the resources that are available to your application, but it does come with a limit. Virtual machines are limited to the capacity of the host they run on, and hosts themselves have physical limitations. Eventually, when you scale up an instance, you can run into these limits, which restrict your ability to add further resources to the instance. Scaling out is concerned with adding additional instances to a service. These can be virtual machines or PaaS services, but instead of adding more capacity by making a single instance more powerful, we add capacity by increasing the overall total number of instances. The advantage of scaling out is that you can conceivably scale out forever if you have more machines to add to the architecture. Scaling out requires some type of load distribution. This could be in the form of a load balancer istributing requests across available servers, or a service discovery mechanism for identifying active servers to send requests to. In both types of scaling, resources can be reduced, which brings cost optimization into the picture. Autoscaling is the process of dynamically allocating resources to match performance requirements. As the volume of work grows, an application may need additional resources to maintain the desired performance levels and satisfy service-level agreements (SLAs). As demand slackens and the additional resources are no longer needed, they can be de-allocated to minimize costs. Autoscaling takes advantage of the elasticity of cloud-hosted environments while easing management overhead. Itreduces the need for an operator to continually monitor the performance of a system and make decisions about adding or removing resources. Optimize network performance When you're optimizing for performance, you'll look at network and storage performance to ensure that their levels are within acceptable limits, because their performance levels can impact the response time of your application. Selecting the right networking and storage technologies for your architecture will help you ensure that you're providing the best exper nce for your consumers, Adding a messaging layer in between services can have a benefit to performance and scalability. Adding a messaging layer creates a buffer for requests between services so that requests can continue to flow in without error if the receiving application can't keep up. As the application works through the requests, they will be answered in the order in which they were received Opt In many large-scale solutions, data is divided into separate partitions that can be managed and accessed separately. The partitioning strategy must be chosen carefully to maximize the benefits while minimizing adverse effects. Partitioning can help improve scalability, reduce contention, and optimize performance. ize storage performance Use caching in your architecture can help improve performance. Caching is a mechanism to store frequently used data or assets (web pages, images) for faster retrieval. Caching can be used at different layers of your application. You can use caching between your application servers and a database in order to decrease data retrieval times. You could also use caching between your end users and your web servers, by placing static content closer to the user and decreasing the time it takes to return web pages to the end user. This also has a secondary effect of offloading requests from your database or web servers, increasing the performance for other requests. Identify performance bottlenecks in your application Distributed applications and services running in the cloud are, by their nature, complex pieces of software that comprise many moving parts. In a production environment, it's important to be able to track the way in which users utilize your system, trace resource utilization, and generally monitor the health and performance of your system. You can use this information as a diagnostic aid to detect and correct issues, and also to help spot potential problems and prevent them from occurring.Performance optimization will include understanding how the applications themselves are performing. Errors, poorly performing code, and bottlenecks in dependent systems can all be uncovered through an application performance management tool. Often, these issues may be hidden or obfuscated for end users, developers, and administrators, but can have adverse impact on the overall performance of your application. Look across all layers of your application and identify and remediate performance bottlenecks in your application. These bottlenecks could be poor memory handling in your application, or even the process of adding indexes into your database. It may be an iterative process as you relieve one bottleneck and then uncover another that you were unaware of. With a thorough approach to performance monitoring, you'll be able to determine the types of patterns and practices that your architecture will benefit from, Reliability Imagine that you run a clinical system for a healthcare organization. Clinicians and caregivers have little tolerance for downtime. They need to have access to clinical IT systems around the clock to ensure they're providing the highest-quality care at all times. To meet the around-the-clock demands of clinicians, applications must be able to handle failures with minimal impact to their users. How do they ensure their applications remain operational, both for localized incidents and large-scale disasters? In this unit, you'll learn how to include elements from the reliability pillar in your architecture design. What is reliability? Ina complex application, any number of things can go wrong at any scale. Individual servers and hard drives can fail. A deployment issue could unintentionally drop all tables in a database. Whole datacenters may become unreachable. A ransomware incident could maliciously encrypt all your data. It's critical that your application has the ability to be reliable, and handle both localized and broad impact incidents Designing for reliability includes maintaining uptime through small-scale incidents and temporary conditions like partial network outages. You can ensure yourapplication can handle localized failures by integrating high availability into each component of an application and eliminating single points of failure. Such a design also minimizes the impact of infrastructure maintenance. High-availability designs typically aim to eliminate the impact of incidents quickly and automatically and ensure that the system can continue to process requests with little to no impact. Designing for reliability also focuses on recovery from data loss and from larger scale disasters, Recovery from these types of incidents often involves active intervention, though automated recovery steps can reduce the time needed to recover. These types of incidents may result in some amount of downtime or permanently lost data Disaster recovery is as much about careful planning as it is about execution Including high availability and recoverability in the design of your architecture protects your business from financial losses resulting from downtime and lost data, They ensure your reputation isn't negatively impacted by a loss of trust from your customers. Architecting for reliability ensures that your application can meet the commitments you make to your customers. This includes ensuring your systems are available to end users and can recover from any failures. Build a highly available architecture For availability, identify the service-level agreement (SLA) you're committing to Examine the potential high-availability capabilities of your application relative to your SLA, and identify where you have proper coverage and where you'll need to make improvements. Your goal is to add redundancy to components of the architecture so that you are less likely to experience an outage. Examples of high-availability design components include clustering and load balancing. * Clustering replaces a single VM with a set of coordinated VMs. When one VM fails or becomes unreachable, services can fail over to another one that can service the requests. * Load balancing spreads requests across many instances of a service, detecting failed instances and preventing requests from being routed to them. Build an architecture that can recover from failure For recoverability, you should perform an analysis that examines your possible data should include an exploration of recovery strategies and the cost-benefit tradeoff for each. This exercise will give you important insight into your organization's priorities, and help clarify the role of your loss and major downtime scenarios. Your analy:application, The results should include the application's recovery point objective (RPO) and recovery time objective (RTO). * Recovery Point Objective (RPO): The maximum duration of acceptable data loss. RPO is measured in units of time, not volume. For example, "30 minutes of data", "four hours of data’, and so on. RPO is about limiting and recovering from data loss, not data theft. * Recovery Time Objective (RTO): The maximum duration of acceptable downtime, where "downtime" needs to be defined by your specification. For example, if the acceptable downtime duration is eight hours in the event of a disaster, then your RTO is eight hours. With RPO and RTO defined, you can design backup, restore, replication, and recovery capabilities into your architecture to meet these objectives Every cloud provider offers a suite of services and features you can use to improve your application's availability and recoverability. When possible, use existing services and best practices, and try to resist creating your own. Hard drives can fail, datacenters can become unreachable, and hackers can attack. It's important that you maintain a good reputation with your customers using availability and recoverability. Availability focuses on maintaining uptime through conditions like network outages, and recoverability focuses on retrieving data after a disaster. Security Healthcare organizations store personal and potentially sensitive client data Financial institutions store account numbers, balances, and transaction history. Retailers store purchase history, account information, and demographic details of customers. A security incident could expose this sensitive data, which could cause personal embarrassment or financial harm. How do you ensure the integrity of their data and ensure your systems are secure? In this unit, you'll learn about the important elements of the security pillar. What is security?Security is ultimately about protecting the data your organization uses, stores, and transmits. The data your organization stores or handles is at the heart of your securable assets. This data could be sensitive data about customers, financial information about your organization, or critical line-of-business data supporting your organization. Along with data, securing the infrastructure it exists on, and the identities used to access it, are also critically important. Your data may be subject to additional legal and regulatory requirements depending on where you are located, the type of data you are storing, or the industry that your application operates in. For instance, in the healthcare industry in the US, there is a law called the Health Insurance Portability and Accountability Act (HIPAA). In the financial industry, the Payment Card Industry Data Security Standard is concerned with the handling of credit card data. Organizations that store data that is in scope for these laws and standards are required to ensure certain safeguards are in place for the protection of this data. In Europe, the General Data Protection Regulation (GDPR) lays out the rules of how personal data is protected, and defines individuals’ rights related to stored data. Some countries require that certain types of data do not leave their borders, When a security breach occurs, there can be substantial impacts to the finances and reputation of both organizations and customers. This breaks down the trust, customers are willing to instill in your organization, and can impact its long-term health. Defense in depth A multilayered approach to securing your environment will increase the security posture of your environment, Commonly known as defense in depth, we can break down the layers as follows: * Data * Applications * VM/compute * Networking * Perimeter * Policies & access * Physical securityEach layer focuses on a different area where attacks can happen and creates a depth of protection, should one layer fail or be bypassed by an attacker. If we were to focus on just one layer, an attacker would have unfettered access to your environment should they get through this layer. Addressing security in layers increases the work an attacker must do to gain access to your systems and data. Each layer will have different security controls, technologies, and capabilities that will apply. When identifying the protections to put in place, cost will often be of concern, and will need to be balanced with business requirements and overall risk to the business. __ Defense in-depth security layers There is no single security system, control, or technology that will fully protect your architecture. Security is more than just technology, it's also about people and processes. Creating an environment that looks holistically at security, and making it a requirement by default, will help ensure that your organization is as secure as possible. Protect from common attacks At each layer, there are some common attacks that you will want to protect against. These are not all-inclusive, but can give you an idea of how each layer can be attacked and what types of protections you may need to look at. * Data layer: Exposing an encryption key or using weak encryption can leave your data vulnerable should unauthorized access occur. * Application layer: Malicious code injection and execution are the hallmarks of application-layer attacks. Common attacks include SQL injection and cross-site scripting (XSS)¢ VM/compute layer: Malware is a common method of attacking an environment, which involves executing malicious code to compromise a system. Once malware is present on a system, further attacks leading to credential exposure and lateral movement throughout the environment can occur. «Networking layer: Unnecessary open ports to the Internet are a common method of attack. These could include leaving SSH or RDP open to virtual machines. When open, these could allow brute-force attacks against your systems as attackers attempt to gain access. * Perimeter layer: Denial-of-service (DoS) attacks are often seen at this layer. These attacks attempt to overwhelm network resources, forcing them to go offline or making them incapable of responding to legitimate requests. * Policies & access layer: This layer is where authentication occurs for your application. This layer could include modern authentication protocols such as OpenID Connect, OAuth, or Kerberos-based authentication such as Active Directory. The exposure of credentials is a risk at this layer, and it’s important to limit the permissions of identities. We also want to have monitoring in place to look for possible compromised accounts, such as logins coming from unusual places, * Physical layer: Unauthorized access to facilities through methods such as door drafting and theft of security badges can be seen at this layer. Shared security responsil Revisiting the model of shared responsibility, we can reframe this in the context of security. Depending on the type of service you select, some security protections will be built in to the service, while others will remain your responsibility. Careful evaluation of the services and technologies you select will be necessary, to ensure you are providing the proper security controls for your architectureResponsibility Data governance & fights management lientendpoints ‘Account & access ‘management Identity & directory infractructure Application Netwerk controls Operating system Physical hosts Physical network Physical datacenter [aEEooeenemee SERRE EEE: a BRBBrr rose BEE eeers g Customer
You might also like
AZ 305T00A ENU TrainerPrepGuide
PDF
No ratings yet
AZ 305T00A ENU TrainerPrepGuide
8 pages
Conditional Access
PDF
No ratings yet
Conditional Access
39 pages
AZ-900T00-A - Microsoft Azure Fundamentals - Skillpipe
PDF
0% (1)
AZ-900T00-A - Microsoft Azure Fundamentals - Skillpipe
1 page
AZ 104T00A ENU PowerPoint - 00
PDF
No ratings yet
AZ 104T00A ENU PowerPoint - 00
17 pages
AZ-900 Prepaway Premium Exam 208q
PDF
100% (1)
AZ-900 Prepaway Premium Exam 208q
185 pages
Cluster System Location War Asset
PDF
No ratings yet
Cluster System Location War Asset
4 pages
Azure AD
PDF
No ratings yet
Azure AD
10 pages
Az 104t00a Enu Powerpoint 11
PDF
No ratings yet
Az 104t00a Enu Powerpoint 11
43 pages
AZ305 Exam Short Notes
PDF
No ratings yet
AZ305 Exam Short Notes
20 pages
AZ-900T01 Microsoft Azure Fundamentals-02
PDF
No ratings yet
AZ-900T01 Microsoft Azure Fundamentals-02
51 pages
V1 4 Infrastructure and Database Migration To Azure Specialization Checklist Plus
PDF
No ratings yet
V1 4 Infrastructure and Database Migration To Azure Specialization Checklist Plus
34 pages
V1.4 MSFT Azure VMware Solution Spec Audit Checklist, Program, FAQ
PDF
No ratings yet
V1.4 MSFT Azure VMware Solution Spec Audit Checklist, Program, FAQ
24 pages
Dockers and Kubernetes: A Way To Build Scalable and Portable Applications With Cloud
PDF
No ratings yet
Dockers and Kubernetes: A Way To Build Scalable and Portable Applications With Cloud
133 pages
AZ 104T00A ENU PowerPoint - 00
PDF
No ratings yet
AZ 104T00A ENU PowerPoint - 00
4 pages
Azure CSP Documntation
PDF
No ratings yet
Azure CSP Documntation
376 pages
AZ-304 Official Course Study Guide
PDF
No ratings yet
AZ-304 Official Course Study Guide
17 pages
Az 103 PDF
PDF
No ratings yet
Az 103 PDF
20 pages
70-473 Design and Implement Cloud Data Platform Solutions
PDF
100% (2)
70-473 Design and Implement Cloud Data Platform Solutions
74 pages
Purpose: Trainer Preparation Guide: AZ-104T00A
PDF
No ratings yet
Purpose: Trainer Preparation Guide: AZ-104T00A
6 pages
AZ-304-Version 4.0
PDF
No ratings yet
AZ-304-Version 4.0
164 pages
Implementing Microsoft Azure Infrastructure Solutions
PDF
100% (1)
Implementing Microsoft Azure Infrastructure Solutions
9 pages
Azure Week1 - Class Presentation
PDF
No ratings yet
Azure Week1 - Class Presentation
43 pages
SC 200t00a Enu Powerpoint 08
PDF
No ratings yet
SC 200t00a Enu Powerpoint 08
48 pages
8 Attributes of Successful Iot Solutions
PDF
No ratings yet
8 Attributes of Successful Iot Solutions
10 pages
How To Build A Cloud Landing Zone That Delivers Real Business Value White Paper
PDF
No ratings yet
How To Build A Cloud Landing Zone That Delivers Real Business Value White Paper
24 pages
Microsoft (AZURE) AZ-301 Dumps PDF - Best Study Material Ever
PDF
No ratings yet
Microsoft (AZURE) AZ-301 Dumps PDF - Best Study Material Ever
8 pages
AZ 305T00A ENU TrainerCaseStudies
PDF
No ratings yet
AZ 305T00A ENU TrainerCaseStudies
27 pages
AZ-104T00 Microsoft Azure Administrator: Course Description
PDF
No ratings yet
AZ-104T00 Microsoft Azure Administrator: Course Description
19 pages
Azure Fundamentals Powerpoint
PDF
No ratings yet
Azure Fundamentals Powerpoint
121 pages
AZ 104T00A ENU PowerPoint - 00
PDF
No ratings yet
AZ 104T00A ENU PowerPoint - 00
17 pages
1 Azure Strategic Implementation Guide For IT Organizations New To Azure
PDF
100% (1)
1 Azure Strategic Implementation Guide For IT Organizations New To Azure
121 pages
The 10 Riskiest Azure Misconfigurations
PDF
No ratings yet
The 10 Riskiest Azure Misconfigurations
11 pages
Website: VCE To PDF Converter: Facebook: Twitter:: Sections
PDF
No ratings yet
Website: VCE To PDF Converter: Facebook: Twitter:: Sections
25 pages
Azure Migration From EOS To Azure A Migration Path
PDF
No ratings yet
Azure Migration From EOS To Azure A Migration Path
18 pages
Microsoft: AZ-303 Exam
PDF
No ratings yet
Microsoft: AZ-303 Exam
140 pages
Azure Cloud Architect Master Program - Slim Up - N PDF
PDF
No ratings yet
Azure Cloud Architect Master Program - Slim Up - N PDF
20 pages
AZ 104T00A ENU PowerPoint - 09
PDF
No ratings yet
AZ 104T00A ENU PowerPoint - 09
47 pages
Azure Arc Overview
PDF
No ratings yet
Azure Arc Overview
2 pages
AZ-104T00 - Microsoft Azure Administrator: Assessment Guide
PDF
No ratings yet
AZ-104T00 - Microsoft Azure Administrator: Assessment Guide
12 pages
WWW - Aka.ms/pathways: Azure Reserved Instances
PDF
No ratings yet
WWW - Aka.ms/pathways: Azure Reserved Instances
1 page
Az 500
PDF
No ratings yet
Az 500
48 pages
Microsoft Azure Use Cases For Everyone: Ebook
PDF
No ratings yet
Microsoft Azure Use Cases For Everyone: Ebook
16 pages
SC 100t00a Enu Powerpoint 02
PDF
No ratings yet
SC 100t00a Enu Powerpoint 02
74 pages
Az 104t00a Enu Powerpoint 01
PDF
No ratings yet
Az 104t00a Enu Powerpoint 01
25 pages
Azure Tenant To Tenant Migration
PDF
No ratings yet
Azure Tenant To Tenant Migration
9 pages
Az 304
PDF
No ratings yet
Az 304
187 pages
Microsoft Cloud Storage For Enterprise Architects
PDF
No ratings yet
Microsoft Cloud Storage For Enterprise Architects
5 pages
Az 104t00a Enu Powerpoint 03
PDF
No ratings yet
Az 104t00a Enu Powerpoint 03
28 pages
AZ 500T00A ENU Powerpoint 01
PDF
No ratings yet
AZ 500T00A ENU Powerpoint 01
92 pages
Case Study On Microsoft Azure
PDF
No ratings yet
Case Study On Microsoft Azure
3 pages
AZ-303 PrepAway
PDF
100% (1)
AZ-303 PrepAway
69 pages
Lab-Demo-Recordings - AZ-104.md at Master MicrosoftLearning - Lab-Demo-Recordings GitHub
PDF
No ratings yet
Lab-Demo-Recordings - AZ-104.md at Master MicrosoftLearning - Lab-Demo-Recordings GitHub
2 pages
Azure Security
PDF
No ratings yet
Azure Security
22 pages
Az-305 8
PDF
No ratings yet
Az-305 8
47 pages
BRK3201 Slidedeck
PDF
No ratings yet
BRK3201 Slidedeck
69 pages
Azure Fundamentals - Useful Links
PDF
No ratings yet
Azure Fundamentals - Useful Links
5 pages
AZ 104T00A Module - 07
PDF
No ratings yet
AZ 104T00A Module - 07
50 pages
PL 500t00a Enu Powerpoint 06
PDF
No ratings yet
PL 500t00a Enu Powerpoint 06
42 pages
Azure Virtual Desktop Telescript - July 2021
PDF
No ratings yet
Azure Virtual Desktop Telescript - July 2021
19 pages
Presentacion Azure Migration
PDF
No ratings yet
Presentacion Azure Migration
157 pages
Azure WellArchitectedFramework
PDF
No ratings yet
Azure WellArchitectedFramework
35 pages
Li Solve Challenges With Rhel 10 Ebook 2155890 202505 en
PDF
No ratings yet
Li Solve Challenges With Rhel 10 Ebook 2155890 202505 en
14 pages
Motivation For Dependency Injection
PDF
No ratings yet
Motivation For Dependency Injection
3 pages
Smith CleanArchAspNetCore
PDF
No ratings yet
Smith CleanArchAspNetCore
33 pages
JSP Datadriven
PDF
No ratings yet
JSP Datadriven
6 pages
Caritas Manila Annual Report 2020
PDF
No ratings yet
Caritas Manila Annual Report 2020
45 pages
Integer Data Type in DBMS
PDF
No ratings yet
Integer Data Type in DBMS
1 page
The Open Group Architecture Framework
PDF
No ratings yet
The Open Group Architecture Framework
8 pages
Unit Testing CSharp
PDF
No ratings yet
Unit Testing CSharp
3 pages
STTREND Reflection Paper No: 10
PDF
No ratings yet
STTREND Reflection Paper No: 10
1 page
3 Common Kinds of Unnecessary Code Comments: Nickleus Jimenez August 2020
PDF
No ratings yet
3 Common Kinds of Unnecessary Code Comments: Nickleus Jimenez August 2020
2 pages
Dragon Age Origin Console Commands
PDF
No ratings yet
Dragon Age Origin Console Commands
3 pages
Deliverable03 Tweet Miner
PDF
No ratings yet
Deliverable03 Tweet Miner
5 pages