More Online Training!!
Since it’s Monday, it seems like a great day to tell you about some more free online training that’s coming up from the Microsoft Virtual Academy.
- Azure Active Directory Core Skills Jumpstart – March 26th, 8am-12pm Pacific. (I actually mentioned this one a few weeks ago, but it’s worth repeating.)
- Getting Started with Azure Security for the IT Professional – April 15 & 16, 9am-1pm Pacific
Azure Storage Redundancy Options
- Locally Redundant Storage (LRS)
- Zone Redundant Storage (ZRS)
- Geographically Redundant Storage (GRS)
- Read-Access Geographically Redundant Storage (RA-GRS)
Hybrid Cloud – What’s all the Fuss?
You’ve probably been hearing a lot about the hybrid cloud lately and this post won’t be all that different. But what is all the fuss?
We know the benefits of virtualizing compute and sharing other resources on-prem, but there are limits to what a lot of enterprises can obtain within their own four walls. You can leverage what the cloud has invested in things such as storage, redundancy, failover and authorization services and use that to expand resources as your business needs them. The hybrid cloud is the future because it’s not “one size fits all” – build based on the needs of the business service or application that you are making available or improving on.
That being said, if you are looking to learn a bit more about how Azure can meet you hybrid cloud needs be sure check out the Hybrid Cloud for the IT Pro Blog Series in progress right now, covering a variety of topics related to developing your plan for extending your datacenter beyond it’s current walls.
I also recommend checking out this MVA course on Moving to Hybrid Cloud with Azure. It’s only 90 minutes and it’s hosted by Keith Mayer and Brian Lewis, two of my favorite Tech Evangelists. Plus they really know their stuff.
The Hybrid Cloud for the IT Professional – The Blog Series Begins Today!
Over the next three weeks, the US IT Pro Evangelists will be running a blog series on extending your data center with Azure. You’ll find the complete series, with links updated daily at http://aka.ms/HybridCloudforITPro.
The series will include posts by Yung Chou, Kevin Remde, Dan Stolts, Tommy Patterson, Blain Barton, Jessica DeVita and myself. We will be covering a variety of Azure IaaS topics like:
- Infrastructure services
- Backup solutions
- Networking fundamentals
- Connectivity and Remote Access
- SQL Server
- Multi-factor Authentication
- Azure certifications
Upcoming Community Tech Events in SoCal
For those of you in southern California, I’ve gotten wind of some upcoming events that might be of interest. Check them out if you are in the area.
So-Cal Azure User Group – Costa Mesa, 2/24
Register Here: http://www.meetup.com/SoCal-Microsoft-Azure-User-Group/events/220261351/
So-Cal System Center User Group – San Diego, 3/2 or Irvine 3/3
Wally’s Top SCCM 2012 Features with Cool Tips and Tricks
Register Here for March San Diego Event: https://www.eventbrite.com/e/microsoft-system-center-so-cal-user-group-msc-scug-san-diego-march-2nd-tickets-15150502561
Register Here for March Irvine Event: https://www.eventbrite.com/e/microsoft-system-center-so-cal-user-group-msc-scug-irvine-march-3rd-tickets-15149810491
San Diego SharePoint User Group – San Diego, 3/11
Fundamentals of Creating SharePoint Apps with Tim Odell
Register Here: http://www.meetup.com/San-Diego-SharePoint-User-Group-SanSPUG/events/219661901/
PFE Days – San Diego, 3/19
Getting the Best from Azure IaaS with Javier Dominguez
Register Here: http://www.meetup.com/Microsoft-PFE-Days-Technology-Event-SoCal/events/220098582/
Los Angeles Big Data Users Group – Multiple Events (visit their link)
Upcoming MVA Courses
I was poking around on Microsoft Virtual Academy today and discovered a bunch of great looking live events that are coming up in the next several weeks. If you’ve never checked out MVA, now is the time to visit and register!
The Imperfect Lab: Check out the Microsoft Test Lab Guides
The Imperfect Lab: Letting Additional Administrators Remotely Connect to Servers
An age-old server administration best practice is to make sure that everyone who is administering servers on your network are doing it with their own “admin” credentials.
Up until this point, I’ve done all my remote Azure sessions (PS-Session) with the built-in administrator account. This works fine if you are only person connecting remotely to a server. But what if you want to grant others administrative rights to your machine and they would also like to connect remotely?
Your first step would likely be to add them to the local administrators group. Since you’ve already turned on the “remote management” feature for yourself, you might expect this to work out of the box.
But you probably overlooked this little note in the “Configure Remote Management” box when you enabled remote management – “Local Administrator accounts other than the built-in admin may not have rights to manage this computer remotely, even if remote management is enabled.”
That would be your hint that some other force might be at work here. Turns out that UAC is configured to filter out everyone except the built-in administrator for remote tasks.
A review of this TechNet information gives a little more detail:
“Local administrator accounts other than the built-in Administrator account may not have rights to manage a server remotely, even if remote management is enabled. The Remote User Account Control (UAC) LocalAccountTokenFilterPolicy registry setting must be configured to allow local accounts of the Administrators group other than the built-in administrator account to remotely manage the server.”
To open up UAC to include everyone in your local Admins group for remote access, you’ll need to make some registry changes.
Follow these steps to manually edit the registry:
- Click Start, type regedit in the Start Search box, and then click regedit.exe in the Programs list.
- Locate and then click the following registry subkey:
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
- On the Edit menu, point to New, and then click DWORD Value.
- Type LocalAccountTokenFilterPolicy for the name of the DWORD, and then press ENTER.
- Right-click LocalAccountTokenFilterPolicy, and then click Modify.
- In the Value data box, type 1, and then click OK.
- Exit Registry Editor.
Now you will be able to remotely connect and administer your server using PowerShell with any account you’ve give Admin rights too for that particular server. This would hold true for servers in Azure, as well as servers on your local network.
Special shout out to Bret Stateham for bringing this “remote admin road-bump” to my attention. Sometimes what looks like an “Azure” problem, is really a “Server” feature. 🙂
The Imperfect Lab: Not So SharePointed
- You are prompted to give a domain name for a new FOREST domain.
- You must create a NEW virtual network.